The Importance of the Job Role in Social Media Cybersecurity Training
dc.contributor.author | Ben Salamah, F | |
dc.contributor.author | PALOMINO, MARCO | |
dc.contributor.author | Papadaki, Maria | |
dc.contributor.author | Furnell, Steven | |
dc.date.accessioned | 2022-08-04T13:20:57Z | |
dc.date.available | 2022-08-04T13:20:57Z | |
dc.date.issued | 2022-06 | |
dc.identifier.isbn | 9781665495608 | |
dc.identifier.uri | http://hdl.handle.net/10026.1/19477 | |
dc.description.abstract |
Social media has become embedded in our everyday lives, personal activities and the workplace. Thus, educating users on emerging cybersecurity challenges for social media has become imperative. As such, we have investigated the feasibility of an awareness-raising and adaptive cybersecurity training system. Our investigation is aided by a questionnaire, which was administered online using Google Forms. We collected answers from 641 employees from a variety of sectors: education, healthcare, leadership and management, arts, entertainment, police and the military. We found that a one-size-fits-all training approach is highly ineffective, as people's understanding and knowledge can vary greatly. Thus, we have proceeded to identify the factors that influence the success of any given approach. Information such as gender, age, education level, job roles, and training preferences seem essential considerations for developing a robust training strategy. Our investigation concludes that 'job role' is the most significant factor associated with people's preferences and perceptions in cybersecurity training. Also, people appear to be in favour of adaptive training. Moreover, a mixed delivery approach is likely to be welcomed. | |
dc.format.extent | 454-462 | |
dc.language.iso | en | |
dc.publisher | IEEE | |
dc.subject | cybersecurity | |
dc.subject | education | |
dc.subject | social media | |
dc.title | The Importance of the Job Role in Social Media Cybersecurity Training | |
dc.type | conference | |
dc.type | Conference Proceeding | |
plymouth.author-url | https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000853211100047&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008 | |
plymouth.date-start | 2022-06-06 | |
plymouth.date-finish | 2022-06-10 | |
plymouth.volume | 00 | |
plymouth.conference-name | 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) | |
plymouth.publication-status | Published | |
plymouth.journal | 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) | |
dc.identifier.doi | 10.1109/eurospw55150.2022.00054 | |
plymouth.organisational-group | /Plymouth | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics | |
plymouth.organisational-group | /Plymouth/Users by role | |
plymouth.organisational-group | /Plymouth/Users by role/Academics | |
dcterms.dateAccepted | 2022-04-01 | |
dc.rights.embargodate | 2022-8-13 | |
dc.rights.embargoperiod | Not known | |
rioxxterms.versionofrecord | 10.1109/eurospw55150.2022.00054 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.type | Conference Paper/Proceeding/Abstract |