Show simple item record

dc.contributor.authorAlohali, M
dc.contributor.authorClarke, Nathan
dc.contributor.authorFurnell, Steven
dc.date.accessioned2021-09-28T09:16:27Z
dc.date.available2021-09-28T09:16:27Z
dc.date.issued2018
dc.identifier.issn2158-107X
dc.identifier.issn2156-5570
dc.identifier.urihttp://hdl.handle.net/10026.1/17952
dc.description.abstract

The risk of sensitive information disclosure and modification through the use of online services has increased considerably and may result in significant damage. As the management and assessment of such risks is a well-known discipline for organizations, it is a challenge for users from the general public. Users have difficulties in using, understanding and reacting to security-related threats. Moreover, users only try to protect themselves from risks salient to them. Motivated by the lack of risk assessment solutions and limited impact of awareness programs tailored for users of the general public, this paper aims to develop a structured approach to help in protecting users from threats and vulnerabilities and, thus, reducing the overall information security risks. By focusing on the user and that different users react differently to the same stimuli, the authors developed a user-centric risk assessment and response framework that assesses and communicates risk on both user and system level in an individualized, timely and continuous way. Three risk assessment models were proposed that depend on user-centric and behavior-related factors when calculating risk. This framework was evaluated using a scenario-based simulation of a number of users and results analyzed. The analysis demonstrated the effectiveness and feasibility of the proposed approach. Encouragingly, this analysis provided an indication that risk can be assessed differently for the same behavior based upon a number of user-centric and behavioral-related factors resulting in an individualized granular risk score/level. This granular risk assessment, provided a more insightful evaluation of both risk and response. The analysis of results was also useful in demonstrating how risk is not the same for all users and how the proposed model is effective in adapting to differences between users offering a novel approach to assessing information security risks.

dc.format.extent148-163
dc.languageen
dc.language.isoen
dc.publisherThe Science and Information Organization
dc.titleThe Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework
dc.typejournal-article
dc.typeJournal Article
plymouth.issue10
plymouth.volume9
plymouth.publication-statusPublished online
plymouth.journalInternational Journal of Advanced Computer Science and Applications
dc.identifier.doi10.14569/ijacsa.2018.091018
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2018-01-01
dc.rights.embargodate2021-9-29
dc.identifier.eissn2156-5570
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.14569/ijacsa.2018.091018
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2018
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV