Abstract
A call for adopting information security awareness amongst end-users has been suggested over the years. Adoption can occur through various methods. These methods each hold their own characteristics, whether being of a positive or negative nature. The challenge to find an appropriate method on which to establish and engage in a security dialog with a user has been written on extensively over the past few years. A number of common key points have been raised in research that addresses information security awareness and how it is conveyed to users. Additional to these common key points, this paper suggests using browser integration as a medium to promote security values and provide security suggestions based on a specific user’s behavioural pattern.
Chapter PDF
Similar content being viewed by others
Keywords
References
Lazarus, L.: The right to security securing rights or securitising rights? Cambridge University Press (2012)
Williams, S.A., Fleming, S.C., Lundqvist, K.O., Parslow, P.N., et al.: Understanding your digital identity. Learning Exchange 1(1) (2010)
Wu, Y., Guynes, C.S., Windsor, J., et al.: Security awareness programs. Review of Business Information Systems (RBIS) 16(4), 165–168 (2012)
Veerasamy, N., Taute, B.: Introduction to emerging threats and vulnerabilities to create user awareness. Information Security South Africa (2009)
I. O. for Standardization and I. E. Commission, ISO/IEC 27002, ser. International Standard. ISO/IEC (2007)
Furnell, S., Thomson, K.-L.: From culture to disobedience: Recognising the varying user acceptance of it security. Computer Fraud & Security 2009(2), 5–10 (2009)
Talib, S., Clarke, N.L., Furnell, S.M.: An analysis of information security awareness within home and work environments. In: ARES 2010 International Conference on Availability, Reliability, and Security, pp. 196–203. IEEE (2010)
Wood, P.: Internet security threat report: 2011 trends. Symantec Corporation, 350 Ellis Stree, Mountain View, CA 94043 USA. Tech. Rep. 17 (April 2012)
Stander, A., Dunnet, A., Rizzo, J.: A survey of computer crime and security in south africa. In: Proceedings of the ISSA 2009 Conference, p. 217. ISSA (2009)
Furnell, S.M., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: A survey of end-users. Computers & Security 25(1), 27–35 (2006)
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.C.: Stronger password authentication using browser extensions. In: Proceedings of the 14th Usenix Security Symposium, vol. 1998 (2005)
Reid, R., Van Niekerk, J., Von Solms, R.: Guidelines for the creation of brain-compatible cyber security educational material in moodle 2.0. In: Information Security South Africa (ISSA), pp. 1–8. IEEE (2011)
Shaw, R.S., Chen, C.C., Harris, A.L., Huang, H.-J.: The impact of information richness on information security awareness training effectiveness. Computers & Education 52(1), 92–100 (2009)
w3schools, Browser display statistics (April 2013), http://www.w3schools.com/browsers/browsers_display.asp
Johnston, J., Eloff, J., Labuschagne, L.: Security and human computer interfaces. Computers & Security 22(8), 675–684 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Potgieter, M., Marais, C., Gerber, M. (2013). Fostering Content Relevant Information Security Awareness through Browser Extensions. In: Dodge, R.C., Futcher, L. (eds) Information Assurance and Security Education and Training. WISE WISE WISE 2013 2011 2009. IFIP Advances in Information and Communication Technology, vol 406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39377-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-39377-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39376-1
Online ISBN: 978-3-642-39377-8
eBook Packages: Computer ScienceComputer Science (R0)