Show simple item record

dc.contributor.authorBen Salamah, F
dc.contributor.authorPALOMINO, MARCO
dc.contributor.authorPapadaki, Maria
dc.contributor.authorFurnell, Steven
dc.date.accessioned2022-08-04T13:20:57Z
dc.date.available2022-08-04T13:20:57Z
dc.date.issued2022-06
dc.identifier.isbn9781665495608
dc.identifier.urihttp://hdl.handle.net/10026.1/19477
dc.description.abstract

Social media has become embedded in our everyday lives, personal activities and the workplace. Thus, educating users on emerging cybersecurity challenges for social media has become imperative. As such, we have investigated the feasibility of an awareness-raising and adaptive cybersecurity training system. Our investigation is aided by a questionnaire, which was administered online using Google Forms. We collected answers from 641 employees from a variety of sectors: education, healthcare, leadership and management, arts, entertainment, police and the military. We found that a one-size-fits-all training approach is highly ineffective, as people's understanding and knowledge can vary greatly. Thus, we have proceeded to identify the factors that influence the success of any given approach. Information such as gender, age, education level, job roles, and training preferences seem essential considerations for developing a robust training strategy. Our investigation concludes that 'job role' is the most significant factor associated with people's preferences and perceptions in cybersecurity training. Also, people appear to be in favour of adaptive training. Moreover, a mixed delivery approach is likely to be welcomed.

dc.format.extent454-462
dc.language.isoen
dc.publisherIEEE
dc.subjectcybersecurity
dc.subjecteducation
dc.subjectsocial media
dc.titleThe Importance of the Job Role in Social Media Cybersecurity Training
dc.typeconference
dc.typeConference Proceeding
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000853211100047&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.date-start2022-06-06
plymouth.date-finish2022-06-10
plymouth.volume00
plymouth.conference-name2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
plymouth.publication-statusPublished
plymouth.journal2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
dc.identifier.doi10.1109/eurospw55150.2022.00054
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2022-04-01
dc.rights.embargodate2022-8-13
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/eurospw55150.2022.00054
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV