Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Human behaviour and data security - What threats exist?

Category: Human Resource Management Paper Type: Report Writing Reference: MLA Words: 2780

The selected topic for investigation is association between human behavior and data security. Different threats associated with data security and human behavior. Different studies have been conducted and past related to data management and identification of different kinds of online threats available for individuals as well as for organization. It is important to understand that threats available online can not only damage users at individual level but it can also damage overall organizations as well. In order to keep this system secure from different kinds of online threats, it is significantly important for the information technology department to install proper antivirus software’s and to keep their operating system updated. It is important to install antivirus software centrally as well as in each individual personal computer of user in the organization.

Data management and online threats of Human behaviour and data security

Data management and online threats are closely associated with each other. It is mostly because of the fact that due to significant amount of prevailing threats, data management is also influenced. With increase in level of threats, requirement to manage the data effectively and security also increases. That is why, data management and its security are closely associated with not only uses of personal computers but it is also important for Organizational users. It is also important for the organization in which I am currently working.

Data management is also responsible for reducing the security risk associated with organization. All the personal information is available in databases of the organization and it is important to make sure that the person information of the customers and suppliers and employees is secured by the information department of the company. It can be done by reducing the security risk and effective implementation of data management systems. It is important to understand that information related to credit card, personal address and mobile number of the customers is present in the data management system of the organizations and it is significantly important to make sure that these types of information are secure with the organization. In recent years, frauds related to credit cards have been increasing and it is important to have effective implementation of data management procedures to make sure that customers and stakeholders are not exposed to credit card frauds and scam (transworldintl).

Data management procedures of Human behaviour and data security

Data management procedures are considered to be cost effective and their benefits are larger in number as compared to the cost. With effective implementation of data management procedures, organization is able to reduce the chances related to data loss and data theft. It is also important to understand that effective implementation of data management procedure help the organization to improve their decision making process. Decision making process is improved when the amount of information available with the managers is increased and information can be increased with implementation of proper data management procedures. With improvement of decision making process, organization will be able to enhance their performance.

Summary of each article of Human behaviour and data security

The article is related to risk perception of cyber security and precautionary behavior. This article was published in computers in human behavior general in 2017. The article is considered to be a quantitative article and is based upon online study. It is focused towards examination of 16 different security hazards available on internet. It also compared students and United States and United Kingdom related to you that of security hazards. The study investigated the perception of risk and other risk dimensions among students in United States and United Kingdom. The study also investigated different levels of predictors associated with perceived security related risk and precautionary behavior online.

The study utilized questionnaire technique in order to collect data from students studying and different universities in United States of America and United Kingdom. A total of 436 respondents participated in the study. 336 respondents were female and 100 respondents were male. The study utilized simple regression analysis technique in order to investigate influence of different selected security hazards on perceived risk level. The study selected approximately 16 different security hazards in order to investigate their effect on perceived risk level. The results of the study suggested that identity theft is considered to be one of the most significant and alarming perceived risk by students and it is considered to be the most risky hazard as compared to other selected security hazards in the study. The results of the study further suggested that email harvesting was identified as the least risky hazard as compared to other selected security Hazard in this study. The study recommended that students should use antivirus software’s and they must frequently update their operating system and security software in order to stay away from different kinds of security hazards (Paul van Schaik a, Onibokun and Coventry).

            Another relevant study was conducted in order to investigate network behavior evaluation method for improving interactive security in virtual network worlds. The study was published in Information Security Journal in 2016. The usage of internet is significantly increasing related to social media platforms with the passage of time. Importance of virtual network worlds is increasing significantly with the passage of time. Due to this fact, trust evaluation mechanism is becoming weak and weak with the passage of time. This study utilized network behavior evaluation method in order to positively influence the online behavior qualities and personal attributes related to internet users mostly associated with social network.

In order to analyze the formulated objectives in this study and to understand the different factors influencing interactive security, 758 different internet users were analyzed. Experimental method was utilized in the study in order to collect data. Observation technique was utilized by the researcher in order to collect data to analyze the formulated objectives. Approximately 56 different internet users participated in the research experiment. Out of these internet users, 19 were related to online entertainment, 22 work related to online shopping, and 15 words related to online social media platforms. The results of the study clearly suggested that network behavior evaluation methods are mostly used in order to identify different kinds of potential threats associated with Internet users and it is used in order to prevent immediate damage two internet users from different kinds of potential threats (Chen and Shen).

            The article is related to an extended perspective on individual security behavior in line of protection motivation theory and a unified security practices instrument. This study was published in volume 45 of the database for advances in information system in 2014. This study is closely associated with different kinds of security threats associated with home computers or personal computers. With the passage of time, security threat related to personal computer is increasing. It is important for the uses of computers to understand these threats and networks in order to identify the responsible determinants. After the identification of responsible determinants, users and individuals will be able to avoid such kind of determinants in future. The study utilized protection motivation theory in order to explore different kinds of similar practices. In order to keep study more specific, one specific security protection behavior was analyzed. This study utilized empirical testing technique in order to analyze the effectiveness of protection motivation theory in order to explain newly developed tool for capturing different kinds of individual security related practices. The results of the study clearly suggested that protection motivation theory is responsible for explaining important variance in the unified security practices (Crossler and Bélanger).

Practical Example of Data Security Threats and Human Behavior of Human behaviour and data security

Human behavior is mostly associated with data security and data breaches. Most of the hackers take help of employees working in the organization in order to breach data security of that specific organization. One of the most significant example is the example of Network Technology company Ubiquiti networks. One of the attackers targeted the employee working in the Finance Department of the Network Technology Company. The attacker was communicating with the employee in such a manner that the employee was thinking that he is receiving legitimate emails from the executives of the company. Email address and the domains which were being used during the communication were look alike and this overall spam resulted in a fraud of about $46.7 million. The attacker requested the employee to transfer this specific amount to an unauthorized third party account (telegraph).

A comparison, contrastive analysis and evaluation of each article of Human behaviour and data security

            Data security is considered to be one of the most significant elements in Modern Times. Different studies have been conducted recently in order to investigate different factors associated with data security. Similar study was conducted in past investigating the risk perceptions of cyber security and precautionary behavior which can be implemented in order to reduce the risk of cyber security prevailing online. This study significantly contributed towards the topic of human behavior and data security. This study highlighted that theft and cyber bullying are considered to be significant factors responsible for contributing towards cyber security.

The results of the study suggested that non aggregated data analysis can be used in order to avoid methodological fallacies. Results of the study further suggested that human factor is considered to be the weakest link associated with security breach related to online websites. Antivirus software’s, Firewall, network protection, and host intrusion protection system are being used in order to reduce the risk of security breaches online and it has more influence on data security as compared to human factor.

Different methodologies have been adopted in past by researchers in studies related to data management. The three articles included in this study have utilized the technique of survey and questionnaire in order to collect data to investigate the formulated objectives of the study related to data management and human behavior. Data was collected from different students studying in university is related to Information Technology and staff members working in different organizations related to Information Technology and data management were also interviewed in order to collect data to investigate the formulated objectives of the study.

It is important to understand that studies included in this assignment have some limitations as well. It was not possible to formulate the results entirely on the basis of question and survey technique. Some of the results have been obtained by analyzing the literature review related to previous studies and interviews with experts were also conducted in order to collect open ended responses and information related to cyber security and data management.

Data Management Improvement of Human behaviour and data security

Techniques for Data Management Improvement of Human behaviour and data security

There are different significant techniques which can be implemented in order to improve policies related to data management. One of the most significant suggestions is to take the ownership of data management. Most of the organizations are now employing chief data officers in order to manage their data internally and to have effective data governance as it is considered to be one of the most significant elements for business is modern days. It is also important that government policies related to cyber crime should be made strict so that criminals related to cyber security threat and Cyber crimes can be dealt accordingly.

Importance of connected databases of Human behaviour and data security

It is important for the organizations to formulate connected databases in order to have effective implementation of data management policy. Different stages of data management include Collection of data, processing of data, storing data and consuming data. It is important to understand that different pillars of business like consumers and suppliers are closely associated with data management as all the data related to consumers and suppliers is present in the databases of the organization.


Figure 1 IT Security Risks

 The above graph provides factors for which the businesses are concerned related to data security and breach. It includes factors like in appropriate sharing of data by using mobile devices, physical laws of mobile devices exposing the organization to significant amount of risk, in appropriate usage of Information Technology related services by employees working in the organization, data of company available with supplier and incidents associated with connected devices and non computing devices.

Consistent policies related to data management of Human behaviour and data security

         It is important not only for the organization but also for the government to make sure that they implement consistent policies related to data management. The implementation of consistent data policies, companies are able to handle and use data in more effective and efficient manner. It is important to understand that the formulated policies should cover the physical as well as virtual and cloud environment associated with data management. It is important to mention here that data management is evolving process for most of the organization. When the company is able to implement the Data Management related policies companywide then it is a significant achievement for the specific company. It not only helps to improve the performance of the company but also helps to improve the efficiency level as well (transworldintl).

            Data is growing at a significant pace with the passage of time. By the end of year 2020, approximately about 1.7 megabytes of new information will be included for every second for every human being living on this planet. This is mostly because of the fact that that is created by the governments around the globe is increasing significantly with the passage of time and it will keep on increasing at rapid speed. It is important for government and related Agencies to increase their efforts related to prioritizing access to data, storage of data and backup of data in order to make sure that the data information and management is safe around the clock. Due to rapid increase in growth of data management, it has become difficult for the government Agencies and organizations to upgrade applications and Solutions related to delivery of efficient Data Management Services (El-Attrash).

            Government data is stored in different types of formats and in different systems. These formats and systems are supported by specific programs. It is important to understand that effective implementation of data management can contribute positively towards agencies. Importance of data management and recognition of data management is significantly increasing for all departments of Government and for all levels of government with the passage of time.

Cyber security of Human behaviour and data security

            Different countries have different rules and regulations formulated related to cyber security. They are different laws and penalties related to cyber security in different countries. It is important for countries at international level to formulate a consolidated law related to cyber security and penalties related to cyber security in order to make sure that the amount of Cyber crimes can be reduced at international level and this criminal act could be minimized at international level by using collective efforts and policies. It is important for the country's to formulate consensus on rules and regulations formulated related to cyber security at international level.

References  of Human behaviour and data security

Chen, Tsung-Yi and Hsiao-Chuan Shen. "A network behavior evaluation method for improving interactive security in virtual network worlds." Information Security Journal: A Global Perspective (2016).

Crossler, Robert and France Bélanger. "An Extended Perspective on Individual Security Behaviors: Protection Motivation Theory and a Unified Security Practices (USP) Instrument." The DATA BASE for Advances in Information Systems (2014).

El-Attrash, Francesca. WHAT GOVERNMENT NEEDS TO KNOW ABOUT DATA MANAGEMENT. 09 08 2017. 20 03 2019. <https://www.govloop.com/government-needs-know-data-management/>.

Paul van Schaik a, Debora Jeske, et al. "Risk perceptions of cyber-security and precautionary behaviour." Computers in Human Behavior (2017).

telegraph. Building a digital security army. 2019. 29 03 2019. <https://www.telegraph.co.uk/business/digital-security/human-behaviour-in-digital-security/>.

transworldintl. 6 Reasons Why Data Management Is Important To Any Organisation. 06 2018. 19 03 2019. <https://transworldintl.com/2018/06/05/6-reasons-why-data-management-is-important-to-any-organisation/>.


Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Unique Academic Solutions

ONLINE

Unique Academic Solutions

6510 Orders Completed

Academic Master

ONLINE

Academic Master

2877 Orders Completed

Engineering Guru

ONLINE

Engineering Guru

8001 Orders Completed