Applications of social network analysis in behavioural information security research: Concepts and empirical analysis
نویسندگان
چکیده
The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation’s social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper proposes the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis approach and describe their empirical applications in a real case study of a large organisation in Vietnam, which utilised these methods to improve employees’ information security awareness. Towards the end of the paper, a framework detailing the strategies for conducting social network analysis in the behavioural information security field is developed and presented.
منابع مشابه
Similarity measurement for describe user images in social media
Online social networks like Instagram are places for communication. Also, these media produce rich metadata which are useful for further analysis in many fields including health and cognitive science. Many researchers are using these metadata like hashtags, images, etc. to detect patterns of user activities. However, there are several serious ambiguities like how much reliable are these informa...
متن کاملConceptual Links between Three Theories of Information Behavior
Background and Aim: There seems to be a conceptual link between some theories of human information behavior. These links exist because some of these theories have been derived from same theories in similar fields or have a same approach in theorizing. Method: In this paper 3 theories of information behavior (information poverty, information overload and social capital) have been discussed and c...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملDynamic Network Data Envelopment Analysis Model Usage in Measuring and Ranking the Financial Performance of Social Security Hospitals Based on their Size
Background: Measuring the hospitals financial performance in the health care system is of great importance. This is because hospitals with good financial performance can maintain reliable systems and provide necessary resources to improve quality. The aim of this study was to measure, compare and rank the financial performance of social security hospitals based on their size using a dynamic net...
متن کاملNetwork Analysis of Interpersonal Relationships in Tehran Stock Exchange
The stock market has an important role in growth and development of countries. Network analysis is one of the latest method in analyzing the stock market. In quantitative science literature, It is a new concept for a macro view to whole market. Therefore, this research analyzes the interpersonal relationships’ network in the Tehran Stock Exchange (TSE). From the type of data collected and analy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 68 شماره
صفحات -
تاریخ انتشار 2017