Advertisement

Fostering Content Relevant Information Security Awareness through Browser Extensions

  • Marius Potgieter
  • Craig Marais
  • Mariana Gerber
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 406)

Abstract

A call for adopting information security awareness amongst end-users has been suggested over the years. Adoption can occur through various methods. These methods each hold their own characteristics, whether being of a positive or negative nature. The challenge to find an appropriate method on which to establish and engage in a security dialog with a user has been written on extensively over the past few years. A number of common key points have been raised in research that addresses information security awareness and how it is conveyed to users. Additional to these common key points, this paper suggests using browser integration as a medium to promote security values and provide security suggestions based on a specific user’s behavioural pattern.

Keywords

information security awareness browser extensions content delivery brain-compatible learning usability 

References

  1. 1.
    Lazarus, L.: The right to security securing rights or securitising rights? Cambridge University Press (2012)Google Scholar
  2. 2.
    Williams, S.A., Fleming, S.C., Lundqvist, K.O., Parslow, P.N., et al.: Understanding your digital identity. Learning Exchange 1(1) (2010)Google Scholar
  3. 3.
    Wu, Y., Guynes, C.S., Windsor, J., et al.: Security awareness programs. Review of Business Information Systems (RBIS) 16(4), 165–168 (2012)CrossRefGoogle Scholar
  4. 4.
    Veerasamy, N., Taute, B.: Introduction to emerging threats and vulnerabilities to create user awareness. Information Security South Africa (2009)Google Scholar
  5. 5.
    I. O. for Standardization and I. E. Commission, ISO/IEC 27002, ser. International Standard. ISO/IEC (2007)Google Scholar
  6. 6.
    Furnell, S., Thomson, K.-L.: From culture to disobedience: Recognising the varying user acceptance of it security. Computer Fraud & Security 2009(2), 5–10 (2009)CrossRefGoogle Scholar
  7. 7.
    Talib, S., Clarke, N.L., Furnell, S.M.: An analysis of information security awareness within home and work environments. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 196–203. IEEE (2010)Google Scholar
  8. 8.
    Wood, P.: Internet security threat report: 2011 trends. Symantec Corporation, 350 Ellis Stree, Mountain View, CA 94043 USA. Tech. Rep. 17 (April 2012)Google Scholar
  9. 9.
    Stander, A., Dunnet, A., Rizzo, J.: A survey of computer crime and security in south africa. In: Proceedings of the ISSA 2009 Conference, p. 217. ISSA (2009)Google Scholar
  10. 10.
    Furnell, S.M., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: A survey of end-users. Computers & Security 25(1), 27–35 (2006)CrossRefGoogle Scholar
  11. 11.
    Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: Proceedings of the 14th Usenix Security Symposium, vol. 1998 (2005)Google Scholar
  12. 12.
    Reid, R., Van Niekerk, J., Von Solms, R.: Guidelines for the creation of brain-compatible cyber security educational material in moodle 2.0. In: Information Security South Africa (ISSA), pp. 1–8. IEEE (2011)Google Scholar
  13. 13.
    Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.-J.: The impact of information richness on information security awareness training effectiveness. Computers & Education 52(1), 92–100 (2009)CrossRefGoogle Scholar
  14. 14.
    w3schools, Browser display statistics (April 2013), http://www.w3schools.com/browsers/browsers_display.asp
  15. 15.
    Johnston, J., Eloff, J., Labuschagne, L.: Security and human computer interfaces. Computers & Security 22(8), 675–684 (2003)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Marius Potgieter
    • 1
  • Craig Marais
    • 1
  • Mariana Gerber
    • 1
  1. 1.School of Information and Communication TechnologyNelson Mandela Metropolitan UniversityPort ElizabethSouth Africa

Personalised recommendations