Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1
Abstract
Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting the culture and awareness of cyber security using theme analysis. The research is applied in terms of purpose, exploratory in terms of method and qualitative in terms of data type. The research data includes all valid articles in the field of culture and cyber security awareness published in 2020 to 2022 inside and outside the country, with 3 keywords (culture, awareness, cyber security) in the valid have been collected and reviewed in the framework of MAXQDA software. The criteria for entering articles in the research was the applicable content for the research question and the criteria for excluding abstracts, book chapters, short reports and lack of access to the full text of the article. Validity was assessed using content validity and data reliability was estimated using Holstie method. Findings showed a review of 392 theme identified the basic themes related to cybersecurity culture and awareness, of which 12 themes were asset organizing, continuity, access and trust, operations, protection, security governance, attitude, behavior, competence, commitment and support, cyber security and they covered the budget. The identified factors can be used as analytical tools in the field of assessing the culture and awareness of cyber security, which is an important factor in the occurrence of cybercrime, in a logical and principled way to reduce cybercrime and solve related problems in the economic field. Educational, security, social and cultural payments.
Authors and Affiliations
Sedigheh Heydari,Majid Barzegar,Amir Hossein Mohammad Davoodi,
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm
In most Internet of Things (IoT) applications, network nodes are limited in terms of energy source. Therefore, the need for innovative methods to eliminate energy loss which shortens the life of networks is fully felt in...
Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)
Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational o...
Improvement of Security in Wireless Communication Networks with Directional Modulation and Artificial Noise
Directional modulation(DM) is an emerging technology for securing wireless communication at the physical layer and is mostly used in the line of sight propagation channels such as millimeter wave communications, next-gen...
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks
Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs
In this paper, a new algorithm called Motion Coding Gravitational Search Algorithm (MGSA) is proposed to find a moving target using a unmanned aerial vehicles (UAVs). Using the laws of physics and the properties of the e...