Applications of social network analysis in behavioural information security research: Concepts and empirical analysis

نویسندگان

  • Duy Dang-Pham
  • Siddhi Pittayachawan
  • Vince Bruno
چکیده

The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation’s social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper proposes the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis approach and describe their empirical applications in a real case study of a large organisation in Vietnam, which utilised these methods to improve employees’ information security awareness. Towards the end of the paper, a framework detailing the strategies for conducting social network analysis in the behavioural information security field is developed and presented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Similarity measurement for describe user images in social media

Online social networks like Instagram are places for communication. Also, these media produce rich metadata which are useful for further analysis in many fields including health and cognitive science. Many researchers are using these metadata like hashtags, images, etc. to detect patterns of user activities. However, there are several serious ambiguities like how much reliable are these informa...

متن کامل

Conceptual Links between Three Theories of Information Behavior

Background and Aim: There seems to be a conceptual link between some theories of human information behavior. These links exist because some of these theories have been derived from same theories in similar fields or have a same approach in theorizing. Method: In this paper 3 theories of information behavior (information poverty, information overload and social capital) have been discussed and c...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

Dynamic Network Data Envelopment Analysis Model Usage in Measuring and Ranking the Financial Performance of Social Security Hospitals Based on their Size

Background: Measuring the hospitals financial performance in the health care system is of great importance. This is because hospitals with good financial performance can maintain reliable systems and provide necessary resources to improve quality. The aim of this study was to measure, compare and rank the financial performance of social security hospitals based on their size using a dynamic net...

متن کامل

Network Analysis of Interpersonal Relationships in Tehran Stock Exchange

The stock market has an important role in growth and development of countries. Network analysis is one of the latest method in analyzing the stock market. In quantitative science literature, It is a new concept for a macro view to whole market. Therefore, this research analyzes the interpersonal relationships’ network in the Tehran Stock Exchange (TSE). From the type of data collected and analy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 68  شماره 

صفحات  -

تاریخ انتشار 2017