The selected topic for investigation is
association between human behavior and data security. Different threats
associated with data security and human behavior. Different studies have been
conducted and past related to data management and identification of different
kinds of online threats available for individuals as well as for organization.
It is important to understand that threats available online can not only damage
users at individual level but it can also damage overall organizations as well.
In order to keep this system secure from different kinds of online threats, it
is significantly important for the information technology department to install
proper antivirus software’s and to keep their operating system updated. It is
important to install antivirus software centrally as well as in each individual
personal computer of user in the organization.
Data management and online threats of Human behaviour and data security
Data management and online threats are
closely associated with each other. It is mostly because of the fact that due
to significant amount of prevailing threats, data management is also
influenced. With increase in level of threats, requirement to manage the data
effectively and security also increases. That is why, data management and its
security are closely associated with not only uses of personal computers but it
is also important for Organizational users. It is also important for the organization
in which I am currently working.
Data management is also responsible for
reducing the security risk associated with organization. All the personal
information is available in databases of the organization and it is important
to make sure that the person information of the customers and suppliers and
employees is secured by the information department of the company. It can be
done by reducing the security risk and effective implementation of data
management systems. It is important to understand that information related to
credit card, personal address and mobile number of the customers is present in
the data management system of the organizations and it is significantly
important to make sure that these types of information are secure with the organization.
In recent years, frauds related to credit cards have been increasing and it is
important to have effective implementation of data management procedures to
make sure that customers and stakeholders are not exposed to credit card frauds
and scam (transworldintl).
Data management procedures of Human behaviour and data security
Data management procedures are considered to
be cost effective and their benefits are larger in number as compared to the
cost. With effective implementation of data management procedures, organization
is able to reduce the chances related to data loss and data theft. It is also
important to understand that effective implementation of data management
procedure help the organization to improve their decision making process.
Decision making process is improved when the amount of information available
with the managers is increased and information can be increased with
implementation of proper data management procedures. With improvement of
decision making process, organization will be able to enhance their
performance.
Summary of each article of Human behaviour and data security
The article is related to risk perception of
cyber security and precautionary behavior. This article was published in
computers in human behavior general in 2017. The article is considered to be a
quantitative article and is based upon online study. It is focused towards
examination of 16 different security hazards available on internet. It also
compared students and United States and United Kingdom related to you that of
security hazards. The study investigated the perception of risk and other risk
dimensions among students in United States and United Kingdom. The study also
investigated different levels of predictors associated with perceived security
related risk and precautionary behavior online.
The study utilized questionnaire technique in
order to collect data from students studying and different universities in
United States of America and United Kingdom. A total of 436 respondents
participated in the study. 336 respondents were female and 100 respondents were
male. The study utilized simple regression analysis technique in order to
investigate influence of different selected security hazards on perceived risk
level. The study selected approximately 16 different security hazards in order
to investigate their effect on perceived risk level. The results of the study
suggested that identity theft is considered to be one of the most significant
and alarming perceived risk by students and it is considered to be the most risky
hazard as compared to other selected security hazards in the study. The results
of the study further suggested that email harvesting was identified as the
least risky hazard as compared to other selected security Hazard in this study.
The study recommended that students should use antivirus software’s and they
must frequently update their operating system and security software in order to
stay away from different kinds of security hazards (Paul van Schaik a, Onibokun and Coventry).
Another
relevant study was conducted in order to investigate network behavior
evaluation method for improving interactive security in virtual network worlds.
The study was published in Information Security Journal in 2016. The usage of
internet is significantly increasing related to social media platforms with the
passage of time. Importance of virtual network worlds is increasing
significantly with the passage of time. Due to this fact, trust evaluation
mechanism is becoming weak and weak with the passage of time. This study utilized
network behavior evaluation method in order to positively influence the online behavior
qualities and personal attributes related to internet users mostly associated
with social network.
In order to analyze the formulated objectives
in this study and to understand the different factors influencing interactive
security, 758 different internet users were analyzed. Experimental method was utilized
in the study in order to collect data. Observation technique was utilized by
the researcher in order to collect data to analyze the formulated objectives.
Approximately 56 different internet users participated in the research
experiment. Out of these internet users, 19 were related to online
entertainment, 22 work related to online shopping, and 15 words related to
online social media platforms. The results of the study clearly suggested that
network behavior evaluation methods are mostly used in order to identify
different kinds of potential threats associated with Internet users and it is
used in order to prevent immediate damage two internet users from different
kinds of potential threats (Chen and Shen).
The
article is related to an extended perspective on individual security behavior
in line of protection motivation theory and a unified security practices
instrument. This study was published in volume 45 of the database for advances
in information system in 2014. This study is closely associated with different
kinds of security threats associated with home computers or personal computers.
With the passage of time, security threat related to personal computer is
increasing. It is important for the uses of computers to understand these
threats and networks in order to identify the responsible determinants. After
the identification of responsible determinants, users and individuals will be
able to avoid such kind of determinants in future. The study utilized protection
motivation theory in order to explore different kinds of similar practices. In
order to keep study more specific, one specific security protection behavior
was analyzed. This study utilized empirical testing technique in order to analyze
the effectiveness of protection motivation theory in order to explain newly
developed tool for capturing different kinds of individual security related
practices. The results of the study clearly suggested that protection
motivation theory is responsible for explaining important variance in the
unified security practices (Crossler and Bélanger).
Practical Example of Data Security
Threats and Human Behavior of Human
behaviour and data security
Human behavior is mostly associated with data
security and data breaches. Most of the hackers take help of employees working
in the organization in order to breach data security of that specific organization.
One of the most significant example is the example of Network Technology
company Ubiquiti networks. One of the attackers targeted the employee working
in the Finance Department of the Network Technology Company. The attacker was
communicating with the employee in such a manner that the employee was thinking
that he is receiving legitimate emails from the executives of the company.
Email address and the domains which were being used during the communication
were look alike and this overall spam resulted in a fraud of about $46.7
million. The attacker requested the employee to transfer this specific amount
to an unauthorized third party account (telegraph).
A comparison, contrastive analysis
and evaluation of each article of Human
behaviour and data security
Data security is considered to be one of the most significant elements
in Modern Times. Different studies have been conducted recently in order to
investigate different factors associated with data security. Similar study was
conducted in past investigating the risk perceptions of cyber security and
precautionary behavior which can be implemented in order to reduce the risk of
cyber security prevailing online. This study significantly contributed towards
the topic of human behavior and data security. This study highlighted that
theft and cyber bullying are considered to be significant factors responsible
for contributing towards cyber security.
The results of the study suggested that non aggregated
data analysis can be used in order to avoid methodological fallacies. Results
of the study further suggested that human factor is considered to be the weakest
link associated with security breach related to online websites. Antivirus software’s,
Firewall, network protection, and host intrusion protection system are being
used in order to reduce the risk of security breaches online and it has more
influence on data security as compared to human factor.
Different methodologies have been adopted in
past by researchers in studies related to data management. The three articles
included in this study have utilized the technique of survey and questionnaire
in order to collect data to investigate the formulated objectives of the study
related to data management and human behavior. Data was collected from
different students studying in university is related to Information Technology
and staff members working in different organizations related to Information
Technology and data management were also interviewed in order to collect data
to investigate the formulated objectives of the study.
It is important to understand that studies
included in this assignment have some limitations as well. It was not possible
to formulate the results entirely on the basis of question and survey
technique. Some of the results have been obtained by analyzing the literature
review related to previous studies and interviews with experts were also
conducted in order to collect open ended responses and information related to
cyber security and data management.
Data Management Improvement of Human behaviour and data security
Techniques for Data Management
Improvement of Human behaviour and data
security
There are different significant techniques
which can be implemented in order to improve policies related to data
management. One of the most significant suggestions is to take the ownership of
data management. Most of the organizations are now employing chief data
officers in order to manage their data internally and to have effective data
governance as it is considered to be one of the most significant elements for
business is modern days. It is also important that government policies related
to cyber crime should be made strict so that criminals related to cyber
security threat and Cyber crimes can be dealt accordingly.
Importance of connected databases of Human behaviour and data security
It is important for the organizations to
formulate connected databases in order to have effective implementation of data
management policy. Different stages of data management include Collection of
data, processing of data, storing data and consuming data. It is important to
understand that different pillars of business like consumers and suppliers are
closely associated with data management as all the data related to consumers
and suppliers is present in the databases of the organization.

Figure 1 IT Security Risks
The
above graph provides factors for which the businesses are concerned related to
data security and breach. It includes factors like in appropriate sharing of
data by using mobile devices, physical laws of mobile devices exposing the organization
to significant amount of risk, in appropriate usage of Information Technology
related services by employees working in the organization, data of company
available with supplier and incidents associated with connected devices and non
computing devices.
Consistent policies related to data
management of Human behaviour and data
security
It
is important not only for the organization but also for the government to make
sure that they implement consistent policies related to data management. The
implementation of consistent data policies, companies are able to handle and
use data in more effective and efficient manner. It is important to understand
that the formulated policies should cover the physical as well as virtual and
cloud environment associated with data management. It is important to mention
here that data management is evolving process for most of the organization.
When the company is able to implement the Data Management related policies companywide
then it is a significant achievement for the specific company. It not only
helps to improve the performance of the company but also helps to improve the
efficiency level as well (transworldintl).
Data
is growing at a significant pace with the passage of time. By the end of year
2020, approximately about 1.7 megabytes of new information will be included for
every second for every human being living on this planet. This is mostly
because of the fact that that is created by the governments around the globe is
increasing significantly with the passage of time and it will keep on
increasing at rapid speed. It is important for government and related Agencies
to increase their efforts related to prioritizing access to data, storage of
data and backup of data in order to make sure that the data information and
management is safe around the clock. Due to rapid increase in growth of data
management, it has become difficult for the government Agencies and organizations
to upgrade applications and Solutions related to delivery of efficient Data
Management Services (El-Attrash).
Government
data is stored in different types of formats and in different systems. These
formats and systems are supported by specific programs. It is important to
understand that effective implementation of data management can contribute
positively towards agencies. Importance of data management and recognition of
data management is significantly increasing for all departments of Government
and for all levels of government with the passage of time.
Cyber security of Human behaviour and data security
Different
countries have different rules and regulations formulated related to cyber
security. They are different laws and penalties related to cyber security in
different countries. It is important for countries at international level to
formulate a consolidated law related to cyber security and penalties related to
cyber security in order to make sure that the amount of Cyber crimes can be
reduced at international level and this criminal act could be minimized at
international level by using collective efforts and policies. It is important
for the country's to formulate consensus on rules and regulations formulated
related to cyber security at international level.
References of Human behaviour and
data security
Chen, Tsung-Yi and
Hsiao-Chuan Shen. "A network behavior evaluation method for improving
interactive security in virtual network worlds." Information Security
Journal: A Global Perspective (2016).
Crossler, Robert and France Bélanger. "An Extended Perspective on
Individual Security Behaviors: Protection Motivation Theory and a Unified
Security Practices (USP) Instrument." The DATA BASE for Advances in
Information Systems (2014).
El-Attrash, Francesca. WHAT GOVERNMENT NEEDS TO KNOW ABOUT DATA
MANAGEMENT. 09 08 2017. 20 03 2019. <https://www.govloop.com/government-needs-know-data-management/>.
Paul van Schaik a, Debora Jeske, et al. "Risk perceptions of
cyber-security and precautionary behaviour." Computers in Human
Behavior (2017).
telegraph. Building a digital security army. 2019. 29 03 2019.
<https://www.telegraph.co.uk/business/digital-security/human-behaviour-in-digital-security/>.
transworldintl. 6 Reasons Why Data Management Is Important To Any
Organisation. 06 2018. 19 03 2019. <https://transworldintl.com/2018/06/05/6-reasons-why-data-management-is-important-to-any-organisation/>.