Abstract
This paper will describe three case studies on the human factors, in personal and public safety and cyber security from the Asia Pacific region (APAC). A deeper consideration of human factors, the impact of “Internet of Things” and cyber security education about the behaviour and actions that can be taken by individuals is at the foundation of public safety and cyber security. The growth of disruption by cyber criminals - especially when using small devices and applications to interact with large social networks is a cause for concern. This is part of the evolving development of a cyber-physical world. The paper presents three case studies and proposes a Self-awareness and Intervention Model for public safety and security by increasing and maintaining the awareness, understanding and preparedness of cyber security measures by the individual when using mobile device applications to participate in large social systems and concludes by highlighting the importance of including the human factors and message framing alongside the cyber security measures in place.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Australia’s Cyber Security Strategy. https://cybersecuritystrategy.dpmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf
Turban, E., Volonino, L., Wood, G.R.: Information Technology for Management: Digital Strategies for Insight, Action and Sustainable Performance. Wiley, Hoboken (2015)
Prieto, R.: Cisco VNI Predicts Near-Tripling of IP Traffic. https://newsroom.cisco.com/press-release-content?type=webcontent&articleId=1771211
Wilkinson, M.: Cyber Security Challenges facing Australia in the Asian-Pacific Region. http://thinkspace.csu.edu.au/itc571securitychallengesinapac/
Tsikerdekis, M., Zeadally, S.: Online deception in social media. Commun. ACM 57(9), 72–80 (2014)
Eustace, K., Burmeister, O.: Ethics and governance of ICT-based social engagement in institutional aged care. In: Seventh Australian Institute of Computer Ethics Conference (AiCE) (2013)
Harvie, G., Burmeister, O., Eustace, K.: Bringing the oldest-old into the digital age: overcoming challenges of mobility, literacy and learning. In: 13th National Conference of Emerging Researchers in Ageing. http://www.era.edu.au/ERA+2014
Harvie, G., Eustace, K., Burmeister, O.K.: Assistive technology devices for the oldest-old: maintaining independence for the fourth age. In: Kreps, D., Fletcher, G., Griffiths, M. (eds.) HCC 2016. IAICT, vol. 474, pp. 25–33. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44805-3_3
Phahlamohlaka, J.: Defence, peace, safety, security and information warfare research, In: SCM Seminar Series. Charles Sturt University, Wagga Wagga, NSW, Australia (2012)
Connolly, C., Maurushat, A., Vaile, D., van Dijk, P.: An overview of international cyber-security awareness raising and educational initiatives. In: International Cyber-Security Awareness, Sydney (2011). Site: acma.gov.au
Stallings, W., Brown, L.: Computer Security: Principles and Practice. Pearson, Upper Saddle River (2012)
De Bruijn, H., Janssen, M.: Building cybersecurity awareness: the need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1–7 (2017)
Stammberger, K.: Mobile & Smart Device Security Survey 2010: Concern Grows as Vulnerable Devices Proliferate, Smartphones are the Tip of the Iceberg. Mocana Corporation (2010)
U.S. Department of Homeland Security: Technical Information Paper-TIP-10-105-01 Cyber Threats to Mobile Devices, Washington (2010)
Nickinson, P.: Android market now has more than a quarter-million applications (2011). http://www.androidcentral.com/android-market-now-has-more-quarter-million-applications
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: 20th USENIX Security Symposium (2011)
Vidas, T., Votipka, D., Christin, N.: All your droids are belong to us: a survey of current android attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies. USENIX Association, Berkeley (2011)
Felt, A.P., Wang, H.J., Moschuk, A., Hanna, S., Chin, E.: Permission re-delegation: attacks and defenses. In: 20th USENIX Security Symposium (2011)
Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behaviour, Electrical Engineering and Computer Sciences, University of California at Berkeley (2012)
Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P.: TaintDroid: an information-flow tracking system for realtime privacy. In: 9th USENIX Symposium on Operating Systems Design and Implementation (2010)
Tsang, P., Kwok, P., Kwong, R., White, B., Fox, R.: Innovation in ICT teaching: a longitudinal case study of Wi-Fi in Hong Kong. Int. J. Innov. Learn. 10(1), 85–101 (2011)
Tsang, P., Eustace, K.: Educational and social implications from a longitudinal Wi-Fi security study (2002–2014). In: Proceedings of the International Conference on Information Technologies, InfoTech 2014, Bulgaria (2014)
Fong, K., Wong, S.: Hong Kong Wi-Fi adoption and security survey 2014. Comput. Inf. Sci. 8(1) (2015)
Symantec: 2015 Internet Security Threat Report. https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf
Fellows, G., McAfee, M., Eustace, K.: The role of human factors in the ICT security of large social systems, Las Vegas USA (2013, Unpublished paper)
Shoichet, C.E.: Is Snowden worth the risk? Latin America weighs pros and cons. http://www.cnn.com/2013/07/11/world/americas/latin-america-snowden-asylum
Warren, M.: Keynote Address, ICT Higher Degree Research Symposium 2016. Charles Sturt University. https://www.asd.gov.au/infosec/mitigationstrategies.htm
Feakin, T., Woodall, J., Nevill, L.: Cyber maturity in the Asia-Pacific Region 2015. ASPI. https://www.aspi.org.au/publications/cyber-maturity-in-the-asia-pacific-region-2015/Cyber-Maturity-2015.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Eustace, K., Islam, R., Tsang, P., Fellows, G. (2018). Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. In: Lin, X., Ghorbani, A., Ren, K., Zhu, S., Zhang, A. (eds) Security and Privacy in Communication Networks. SecureComm 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-78816-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-78816-6_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78815-9
Online ISBN: 978-3-319-78816-6
eBook Packages: Computer ScienceComputer Science (R0)