In 2014, we launched our open-access repository which offers full text access to conference proceedings from many of our events including the INC and HAISA series. These papers are free to access and distribute (subject to citing the source).
» Openaccess proceedings » Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019) |
Title: Holistic Information Security Management for Home Environments
Author(s): Fayez Alotaibi, Nathan Luke Clarke, Steven Furnell
Reference: pp20-33
Keywords: Security Management, Cyber Security awareness, Security Controls, Security Policy, Online Threats, Usability, Home Users
Abstract: A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online threats and attacks. Indeed, home users are increasingly being targeted as they lack the knowledge and awareness about the potential threats and how to protect themselves. The increase in technologies and platforms also increases the burden upon a user to understand how to apply security across the differing technologies, operating systems and applications. This results in managing the security across their technology portfolio increasingly more troublesome and time consuming. This paper presents a novel approach to managing security within the home, which focuses upon the dual need to educate but also provide usable and effective mechanisms for them to secure, configure and manage their computing-related technology in a holistic manner. The proposed approach is presented and evaluated in terms of several usability and functionality aspects by 434 participants. The result of the survey shows that participants are supportive of the approach, have responded positively regarding the usability designs and appreciate the reduced burden and increased usability of utilising policies as an approach to providing effective protection.
Download count: 857
How to get this paper:
PDF copy of this paper is free to download. You may distribute this copy providing you cite this page as the source.