Skip to main content

Assessing Small Institutions’ Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q)

  • Conference paper
  • First Online:
Intelligent Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 285))

Abstract

For large financial institutions, the available resources allocated to cyber security greatly exceed the capabilities of smaller financial institutions, such as credit unions and community banks. However, the sensitivity of personally identifiable information (PII) and associated risks to the institutions and respective consumers in the event of security breaches are the same no matter the size of the financial institution. These facts when assessed in tandem yield a false equivalency: how can a smaller institution with significantly fewer resources keep consumer and company data secure at standards equivalent to large financial institutions? In this research, Human Aspects of Information Security Questionnaires (HAIS-Q) are voluntarily completed by six employees of a small financial institution and 25 undergraduate and graduate students enrolled in computing courses at a small four year collegiate institution and are quantitatively analyzed/discussed to evaluate potential relationships between employee knowledge, attitude, and behavior (KAB model).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Benbasat, I., Goldstein, D.K., Mead, M.: The case research strategy in studies of information systems. MIS Q. 11(3), 369–386 (1987)

    Article  Google Scholar 

  2. Bernard, R.: Information lifecycle security risk assessment: a tool for closing security gaps. Comput. Secur. 26(1), 26–30 (2007)

    Article  MathSciNet  Google Scholar 

  3. Cassini, J.A., Medlin, B.D., Adriana, R.: Laws and regulations dealing with information security and privacy: an investigative study. Int. J. Inf. Secur. Priv. (IJISP) 2(2), 70–82 (2008)

    Article  Google Scholar 

  4. Clarke, N., Li, F., Furnell, S.: A novel privacy preserving user identification approach for network traffic. Comput. Secur. 70(Supplement C), 335–350 (2017)

    Google Scholar 

  5. FFIEC Cybersecurity Assessment Tool. https://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_May_2017_All_Documents_Combined.pdf. Accessed 14 Oct 2020

  6. Dauch, K., Hovak, A., Nestler, R.: Information assurance using a defense in-depth strategy, pp. 267–272 (2009)

    Google Scholar 

  7. Gerber, M., von Solms, R.: Information security requirements – interpreting the legal aspects. Comput. Secur. 27(5), 124–135 (2008)

    Article  Google Scholar 

  8. Groat, S., Tront, J., Marchany, R.: Advancing the defense in depth model, pp. 285–290 (2012)

    Google Scholar 

  9. Hatfield, J.M.: Social engineering in cybersecurity: the evolution of a concept. Comput. Secur. 73, 102–113 (2018)

    Article  Google Scholar 

  10. Kaplan, B., Duchon, D.: Combining qualitative and quantitative methods in information systems research: a case study. MIS Q. 12(4), 571–586 (1988)

    Article  Google Scholar 

  11. Kruger, H.A., Kearney, W.D.: A prototype for assessing information security awareness. Comput. Secur. 25(4), 289–296 (2006)

    Article  Google Scholar 

  12. Osborn, E., Simpson, A.: On small-scale IT users’ system architectures and cyber security: a UK case study. Comput. Secur. 70, 27–50 (2017)

    Article  Google Scholar 

  13. Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40–51 (2017)

    Article  Google Scholar 

  14. Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 42, 165–176 (2014)

    Article  Google Scholar 

  15. Ross, R.S.: Security and Privacy Controls for Federal Information Systems and Organziations [including updates as of 1/22/2015] (NIST, 2015, Revision 4), NIST Special Publication 800-853 Revision 804

    Google Scholar 

  16. Sandhya, S., Sumithra Devi, K.A., Paramasivam, S.: Augmenting Bluetooth security by behavior based user categorization. Procedia Comput. Sci. 57(Supplement C), 1424–1431 (2015)

    Google Scholar 

  17. Sayogo, D.S., Pardo, T.A., Bloniarz, P.: Information sharing and financial market regulation: understanding the capability gap. In: Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance, Albany, New York, USA, pp. 123–131. ACM (2012)

    Google Scholar 

  18. Shameli-Sendi, A., Aghababaei-Barzegar, R., Cheriet, M.: Taxonomy of information security risk assessment (ISRA). Comput. Secur. 57, 14–30 (2016)

    Article  Google Scholar 

  19. Solic, K., Ocevcic, H., Golub, M.: The information systems’ security level assessment model based on an ontology and evidential reasoning approach. Comput. Secur. 55, 100–112 (2015)

    Article  Google Scholar 

  20. Webb, J., Ahmad, A., Maynard, S.B., Shanks, G.: A situation awareness model for information security risk management. Comput. Secur. 44, 1–15 (2014)

    Article  Google Scholar 

  21. Zhu, D., Premkumar, G., Zhang, X., Chao-Hsien, C.: Data mining for network intrusion detection: a comparison of alternative methods. Decis. Sci. 32(4), 635–660 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Glenn Papp .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Papp, G., Lovaas, P. (2021). Assessing Small Institutions’ Cyber Security Awareness Using Human Aspects of Information Security Questionnaire (HAIS-Q). In: Arai, K. (eds) Intelligent Computing. Lecture Notes in Networks and Systems, vol 285. Springer, Cham. https://doi.org/10.1007/978-3-030-80129-8_62

Download citation

Publish with us

Policies and ethics