Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (62)

Search Parameters:
Keywords = cybercrime investigation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 4522 KB  
Article
The Study of Digital Forensics in KSA: Education, and Prosecution Capabilities: A Needs-Based Analysis
by Noura Aleisa
Electronics 2026, 15(2), 316; https://doi.org/10.3390/electronics15020316 - 11 Jan 2026
Viewed by 346
Abstract
This investigation provides a critical analysis of the digital forensics field within the Kingdom of Saudi Arabia (KSA), specifically focusing on its educational systems, and the effectiveness of prosecutorial efforts. Utilizing a mixed-methodology framework and extensive literature reviews, this study reveals pronounced deficiencies [...] Read more.
This investigation provides a critical analysis of the digital forensics field within the Kingdom of Saudi Arabia (KSA), specifically focusing on its educational systems, and the effectiveness of prosecutorial efforts. Utilizing a mixed-methodology framework and extensive literature reviews, this study reveals pronounced deficiencies in digital forensics against increased cybercrime activities. Furthermore, it highlights a general lack of preparedness among digital forensics professionals in KSA and notes significant variations in forensic applications across different judicial and educational contexts. The research recommends creating a uniform national educational framework for digital forensics, improving professional training programs, and strategically enhancing forensic technologies. Through a thorough analysis of demographic trends, educational programs, and adherence to procedural standards, this study proposes targeted strategies to fortify the digital forensic infrastructure of KSA, aligning with the strategic imperatives of Vision 2030. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Graphical abstract

17 pages, 1058 KB  
Article
Trends and Challenges in Cybercrime in Greece
by Anastasios Papathanasiou, Georgios Germanos, Vasiliki Liagkou and Vasileios Vlachos
J. Cybersecur. Priv. 2025, 5(4), 81; https://doi.org/10.3390/jcp5040081 - 2 Oct 2025
Viewed by 2518
Abstract
This study investigates the evolution of cybercrime in Greece by analyzing data from the Cyber Crime Division of the Hellenic Police. By combining 2023 statistics with earlier national and international data (e.g., Europol, FBI), this study presents a comprehensive 15-year view of cybercrime [...] Read more.
This study investigates the evolution of cybercrime in Greece by analyzing data from the Cyber Crime Division of the Hellenic Police. By combining 2023 statistics with earlier national and international data (e.g., Europol, FBI), this study presents a comprehensive 15-year view of cybercrime trends. Key findings highlight a persistent rise in cyber incidents, with financial fraud as the most common type. Other major threats include unauthorized system access, data breaches, and crimes targeting vulnerable populations. The study assesses national legislation aligned with EU directives and outlines stakeholder roles. It underscores the need for adaptive legal frameworks, inter-agency cooperation, and public awareness to mitigate Greece’s growing cybersecurity challenges. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

44 pages, 3307 KB  
Review
Evolution Cybercrime—Key Trends, Cybersecurity Threats, and Mitigation Strategies from Historical Data
by Muhammad Abdullah, Muhammad Munib Nawaz, Bilal Saleem, Maila Zahra, Effa binte Ashfaq and Zia Muhammad
Analytics 2025, 4(3), 25; https://doi.org/10.3390/analytics4030025 - 18 Sep 2025
Cited by 2 | Viewed by 12411
Abstract
The landscape of cybercrime has undergone significant transformations over the past decade. Present-day threats include AI-generated attacks, deep fakes, 5G network vulnerabilities, cryptojacking, and supply chain attacks, among others. To remain resilient against contemporary threats, it is essential to examine historical data to [...] Read more.
The landscape of cybercrime has undergone significant transformations over the past decade. Present-day threats include AI-generated attacks, deep fakes, 5G network vulnerabilities, cryptojacking, and supply chain attacks, among others. To remain resilient against contemporary threats, it is essential to examine historical data to gain insights that can inform cybersecurity strategies, policy decisions, and public awareness campaigns. This paper presents a comprehensive analysis of the evolution of cyber trends in state-sponsored attacks over the past 20 years, based on the council on foreign relations state-sponsored cyber operations (2005–present). The study explores the key trends, patterns, and demographic shifts in cybercrime victims, the evolution of complaints and losses, and the most prevalent cyber threats over the years. It also investigates the geographical distribution, the gender disparity in victimization, the temporal peaks of specific scams, and the most frequently reported internet crimes. The findings reveal a traditional cyber landscape, with cyber threats becoming more sophisticated and monetized. Finally, the article proposes areas for further exploration through a comprehensive analysis. It provides a detailed chronicle of the trajectory of cybercrimes, offering insights into its past, present, and future. Full article
Show Figures

Figure 1

18 pages, 280 KB  
Article
Organisational Challenges in US Law Enforcement’s Response to AI-Driven Cybercrime and Deepfake Fraud
by Leo S. F. Lin
Laws 2025, 14(4), 46; https://doi.org/10.3390/laws14040046 - 4 Jul 2025
Cited by 2 | Viewed by 8486
Abstract
The rapid rise of AI-driven cybercrime and deepfake fraud poses complex organisational challenges for US law enforcement, particularly the Federal Bureau of Investigation (FBI). Applying Maguire’s (2003) police organisation theory, this qualitative single-case study analyses the FBI’s structure, culture, technological integration, and inter-agency [...] Read more.
The rapid rise of AI-driven cybercrime and deepfake fraud poses complex organisational challenges for US law enforcement, particularly the Federal Bureau of Investigation (FBI). Applying Maguire’s (2003) police organisation theory, this qualitative single-case study analyses the FBI’s structure, culture, technological integration, and inter-agency collaboration. Findings underscore the organisational strengths of the FBI, including a specialised Cyber Division, advanced detection tools, and partnerships with agencies such as the Cybersecurity and Infrastructure Security Agency (CISA). However, constraints, such as resource limitations, detection inaccuracies, inter-agency rivalries, and ethical concerns, including privacy risks associated with AI surveillance, hinder operational effectiveness. Fragmented global legal frameworks, diverse national capacities, and inconsistent detection of advanced deepfakes further complicate responses to this issue. This study proposes the establishment of agile task forces, public–private partnerships, international cooperation protocols, and ethical AI frameworks to counter evolving threats, offering scalable policy and technological solutions for global law enforcement. Full article
17 pages, 282 KB  
Article
How Do Internal and External Control Factors Affect Cyberbullying? Partial Test of Situational Action Theory
by Seong-Sik Lee and Sohee Jung
Behav. Sci. 2025, 15(7), 837; https://doi.org/10.3390/bs15070837 - 20 Jun 2025
Cited by 1 | Viewed by 1242
Abstract
This study attempts to provide a comprehensive explanation for cybercrimes, with emphasis on cyberbullying, by applying situational action theory (SAT). Various hypotheses regarding the motivational and moral dimensions of cyberbullying are presented. Specifically, the interaction effects between motivational and moral factors, such as [...] Read more.
This study attempts to provide a comprehensive explanation for cybercrimes, with emphasis on cyberbullying, by applying situational action theory (SAT). Various hypotheses regarding the motivational and moral dimensions of cyberbullying are presented. Specifically, the interaction effects between motivational and moral factors, such as individual morality and environmental factors of differential association with cyberbullying peers, are examined. Moreover, the roles of self-control and deterrence are investigated as internal and external control factors in situations where conflicts arise between an individual’s morality and the moral rules of their environment. The findings of this study support the assertions of SAT and demonstrate significant interaction effects between cyberbullying victimization and moral factors. Furthermore, consistent with SAT’s discussion on conflicts in the moral dimension, this study reveals that self-control functions as a control factor in situations where individuals possess high morality but are confronted with high levels of differential association with cyberbullying peers; however, the argument that deterrence operates in situations of low differential association with cyberbullying peers and low individual morality is not supported. Despite the partial verification of SAT, this theory is generally endorsed and offers utility in explaining cyberbullying. Full article
28 pages, 925 KB  
Article
Edge Convolutional Networks for Style Change Detection in Arabic Multi-Authored Text
by Abeer Saad Alsheddi and Mohamed El Bachir Menai
Appl. Sci. 2025, 15(12), 6633; https://doi.org/10.3390/app15126633 - 12 Jun 2025
Cited by 2 | Viewed by 1090
Abstract
The style change detection (SCD) task asks to find the positions of authors’ style changes within multi-authored texts. It has several application areas, such as forensics, cybercrime, and literary analysis. Since 2017, SCD solutions in English have been actively investigated. However, to the [...] Read more.
The style change detection (SCD) task asks to find the positions of authors’ style changes within multi-authored texts. It has several application areas, such as forensics, cybercrime, and literary analysis. Since 2017, SCD solutions in English have been actively investigated. However, to the best of our knowledge, this task has not yet been investigated in Arabic text. Moreover, most existing SCD solutions represent boundaries surrounding segments by concatenating them. This shallow concatenation may lose style patterns within each segment and also increase input lengths while several embedding models restrict these lengths. This study seeks to bridge these gaps by introducing an Edge Convolutional Neural Network for the Arabic SCD task (ECNN-ASCD) solution. It represents boundaries as standalone learnable parameters across layers based on graph neural networks. ECNN-ASCD was trained on an Arabic dataset containing three classes of instances according to difficulty level: easy, medium, and hard. The results show that ECNN-ASCD achieved a high F1 score of 0.9945%, 0.9381%, and 0.9120% on easy, medium, and hard instances, respectively. The ablation experiments demonstrated the effectiveness of ECNN-ASCD components. As the first publicly available solution for Arabic SCD, ECNN-ASCD would open the door for more active research on solving this task and contribute to boosting research in Arabic NLP. Full article
(This article belongs to the Special Issue New Trends in Natural Language Processing)
Show Figures

Figure 1

18 pages, 1435 KB  
Article
Threats to the Digital Ecosystem: Can Information Security Management Frameworks, Guided by Criminological Literature, Effectively Prevent Cybercrime and Protect Public Data?
by Shahrukh Mushtaq and Mahmood Shah
Computers 2025, 14(6), 219; https://doi.org/10.3390/computers14060219 - 4 Jun 2025
Cited by 1 | Viewed by 2980
Abstract
As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implementation of information security management [...] Read more.
As cyber threats escalate in scale and sophistication, the imperative to secure public data through theoretically grounded and practically viable frameworks becomes increasingly urgent. This review investigates whether and how criminology theories have effectively informed the development and implementation of information security management frameworks (ISMFs) to prevent cybercrime and fortify the digital ecosystem’s resilience. Anchored in a comprehensive bibliometric analysis of 617 peer-reviewed records extracted from Scopus and Web of Science, the study employs Multiple Correspondence Analysis (MCA), conceptual co-word mapping, and citation coupling to systematically chart the intellectual landscape bridging criminology and cybersecurity. The review reveals those foundational criminology theories—particularly routine activity theory, rational choice theory, and deterrence theory—have been progressively adapted to cyber contexts, offering novel insights into offender behaviour, target vulnerability, and systemic guardianship. In parallel, the study critically engages with global cybersecurity standards such as National Institute of Standards and Technology (NIST) and ISO, to evaluate how criminological principles are embedded in practice. Using data from the Global Cybersecurity Index (GCI), the paper introduces an innovative visual mapping of the divergence between cybersecurity preparedness and digital development across 170+ countries, revealing strategic gaps and overperformers. This paper ultimately argues for an interdisciplinary convergence between criminology and cybersecurity governance, proposing that the integration of criminological logic into cybersecurity frameworks can enhance risk anticipation, attacker deterrence, and the overall security posture of digital public infrastructures. Full article
(This article belongs to the Special Issue Using New Technologies in Cyber Security Solutions (2nd Edition))
Show Figures

Figure 1

23 pages, 660 KB  
Article
Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine
by Mohamed Chahine Ghanem, Eduardo Almeida Palmieri, Wiktor Sowinski-Mydlarz, Sahar Al-Sudani and Dipo Dunsin
IoT 2025, 6(1), 18; https://doi.org/10.3390/iot6010018 - 7 Mar 2025
Cited by 3 | Viewed by 4143
Abstract
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, [...] Read more.
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, comparing their forensic capabilities to conventional PC-based forensic investigations. The study identifies key gaps in existing IoT forensic methodologies, including limited tool compatibility, constrained data retention, and difficulties in live memory analysis due to architectural differences. The research employs a testbed-based approach to simulate cyberattacks on both platforms, capturing and analysing forensic artefacts such as system logs, memory dumps, and network traffic. The research findings reveal that while traditional PCs offer extensive forensic capabilities due to superior storage, tool support, and system logging, Raspberry Pi devices present significant forensic challenges, primarily due to their ARM architecture and limited forensic readiness. The study emphasises the need for specialised forensic tools tailored to IoT environments and suggests best practices to enhance forensic investigation capabilities in weaponised IoT scenarios. This research contributes to the field by bridging the gap between theoretical frameworks and real-world forensic investigations, offering insights into the evolving landscape of IoT forensics and its implications for digital evidence collection, analysis, and forensic readiness. Full article
Show Figures

Figure 1

31 pages, 6341 KB  
Article
Bibliometric Mapping of Scientific Production and Conceptual Structure of Cyber Sextortion in Cybersecurity
by Fani Moses Radebe and Kennedy Njenga
Soc. Sci. 2025, 14(1), 12; https://doi.org/10.3390/socsci14010012 - 31 Dec 2024
Cited by 1 | Viewed by 4116
Abstract
This study examines cyber sextortion research using a comprehensive bibliometric analysis. In the field of cybersecurity, cyber sextortion is a form of cybercrime that leverages privacy violations to exploit a victim. This study reviewed research developments on cyber sextortion progressively over time by [...] Read more.
This study examines cyber sextortion research using a comprehensive bibliometric analysis. In the field of cybersecurity, cyber sextortion is a form of cybercrime that leverages privacy violations to exploit a victim. This study reviewed research developments on cyber sextortion progressively over time by looking at scientific productions, thematic developments, scholars’ contributions, and the future thematic trajectory. A bibliometric approach to analyzing the data was applied, which covered 548 peer-reviewed articles, conference papers, and book chapters retrieved from the Scopus database. Results showed a growth trajectory on various thematic concerns in the cyber sextortion field, which has continued to gain traction since the year 2023. Notably, online child sexual abuse is a growing theme in cyber sextortion research. In addition, among other themes, adolescents, mental health, and dating violence are receiving interest among scholars in this field. Additionally, institutions and prolific scholars from countries such as the United States of America, Australia, and the United Kingdom have established research collaborations to improve understanding in this field. The results also showed that research is observed to be emerging from South Africa and Ghana in the African region. Overall, there is potential for more scientific publications and researchers from Africa to contribute to this growing field. The value this study holds is moving beyond deficit-based approaches to how adolescent youth can be resilient and protected from cyber sextortion. A call for a multidisciplinary approach that moves beyond deficit-based approaches toward resilient and autonomy-based approaches is encouraged so that adolescent youth are protected from exploitation. This approach should focus on investigating proactive and resilience-based interventions informed by individuals’ traits and contexts to aid in building digital resilience in adolescents. Full article
(This article belongs to the Special Issue Promoting the Digital Resilience of Youth)
Show Figures

Figure 1

27 pages, 1840 KB  
Article
Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud
by Abdulghani Ali Ahmed, Khalid Farhan, Mohd Izuan Hafez Ninggal and Ghadir Alselwi
Sensors 2025, 25(1), 106; https://doi.org/10.3390/s25010106 - 27 Dec 2024
Viewed by 2842
Abstract
Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and [...] Read more.
Most current research in cloud forensics is focused on tackling the challenges encountered by forensic investigators in identifying and recovering artifacts from cloud devices. These challenges arise from the diverse array of cloud service providers as each has its distinct rules, guidelines, and requirements. This research proposes an investigation technique for identifying and locating data remnants in two main stages: artefact collection and evidence identification. In the artefacts collection stage, the proposed technique determines the location of the artefacts in cloud storage and collects them for further investigation in the next stage. In the evidence identification stage, the collected artefacts are investigated to identify the evidence relevant to the cybercrime currently being investigated. These two stages perform an integrated process for mitigating the difficulty of locating the artefacts and reducing the time of identifying the relevant evidence. The proposed technique is implemented and tested by applying a forensics investigation algorithm on Sync.com cloud storage using the Microsoft Windows 10 operating system. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

20 pages, 2870 KB  
Article
Managing Digital Evidence in Cybercrime: Efforts Towards a Sustainable Blockchain-Based Solution
by Md Hasibul Alam Ratul, Sepideh Mollajafari and Martin Wynn
Sustainability 2024, 16(24), 10885; https://doi.org/10.3390/su162410885 - 12 Dec 2024
Cited by 4 | Viewed by 4312
Abstract
Digital evidence plays a crucial role in cybercrime investigations by linking individuals to criminal activities. Data collection, preservation, and analysis can benefit from emerging technologies like blockchain to provide a secure, distributed ledger for managing digital evidence. This study proposes a blockchain-based solution [...] Read more.
Digital evidence plays a crucial role in cybercrime investigations by linking individuals to criminal activities. Data collection, preservation, and analysis can benefit from emerging technologies like blockchain to provide a secure, distributed ledger for managing digital evidence. This study proposes a blockchain-based solution for managing digital evidence in cybercrime cases in the judicial domain. The proposed solution provides the basis for the development of a new model that leverages a consortium blockchain, allowing secure collaboration among judicial stakeholders, while ensuring data integrity and admissibility in court. An extensive literature review demonstrates blockchain’s potential to create a more secure, efficient evidence management system. The proposed model was implemented in a test environment using a localised blockchain for developing and testing smart contracts, as well as integrating a web interface, with off-chain storage for managing evidence data. The system was subsequently deployed in both the Polygon and Ethereum test networks, simulating real-world blockchain environments, revealing that the operational cost in the Polygon network is reduced by 99.96% compared to Ethereum, thereby offering scalability without compromising security. This study underscores blockchain’s potential to revolutionise the chain of custody procedures, improving dependability and security in evidence management and providing more sustainable solutions within the criminal justice system. Full article
Show Figures

Figure 1

23 pages, 740 KB  
Article
Towards a Comprehensive Metaverse Forensic Framework Based on Technology Task Fit Model
by Amna AlMutawa, Richard Adeyemi Ikuesan and Huwida Said
Future Internet 2024, 16(12), 437; https://doi.org/10.3390/fi16120437 - 22 Nov 2024
Cited by 3 | Viewed by 2108
Abstract
This article introduces a robust metaverse forensic framework designed to facilitate the investigation of cybercrime within the dynamic and complex digital metaverse. In response to the growing potential for nefarious activities in this technological landscape, the framework is meticulously developed and aligned with [...] Read more.
This article introduces a robust metaverse forensic framework designed to facilitate the investigation of cybercrime within the dynamic and complex digital metaverse. In response to the growing potential for nefarious activities in this technological landscape, the framework is meticulously developed and aligned with international standardization, ensuring a comprehensive, reliable, and flexible approach to forensic investigations. Comprising seven distinct phases, including a crucial incident pre-response phase, the framework offers a detailed step-by-step guide that can be readily applied to any virtualized platform. Unlike previous studies that have primarily adapted the existing digital forensic methodologies, this proposed framework fills a critical research gap by providing a proactive and granular investigative process. The approach goes beyond mere adaptation, ensuring a comprehensive strategy that addresses the unique challenges posed by the metaverse environment. The seven phases cover a spectrum of forensic investigation, offering a thorough interpretation with careful consideration of real-life metaverse forensic scenarios. To validate its effectiveness, the proposed framework undergoes a rigorous evaluation against the appropriate ISO/IEC standards. Additionally, metaverse expert reviews, based on the task–technology fit theory, contribute valuable insights. The overall assessment confirms the framework’s adherence to forensic standards, making it a reliable guide for investigators navigating the complexities of cybercrime in the metaverse. This comprehensive metaverse forensic framework provides investigators with a detailed and adaptable tool to address a wide range of cybercrime incidents within the evolving virtualized landscape. Furthermore, its stepwise guidance ensures a thorough and reliable investigation process, offering significant contributions to proactive security measures in the face of emerging challenges in the metaverse. Full article
Show Figures

Figure 1

32 pages, 5273 KB  
Article
Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics
by Zlatan Morić, Vedran Dakić, Ana Kapulica and Damir Regvart
Electronics 2024, 13(22), 4546; https://doi.org/10.3390/electronics13224546 - 19 Nov 2024
Cited by 5 | Viewed by 5764
Abstract
This article delves into Microsoft Azure’s cyber forensic capabilities, focusing on the unique challenges in cloud security incident investigation. Cloud services are growing in popularity, and Azure’s shared responsibility model, multi-tenant nature, and dynamically scalable resources offer unique advantages and complexities for digital [...] Read more.
This article delves into Microsoft Azure’s cyber forensic capabilities, focusing on the unique challenges in cloud security incident investigation. Cloud services are growing in popularity, and Azure’s shared responsibility model, multi-tenant nature, and dynamically scalable resources offer unique advantages and complexities for digital forensics. These factors complicate forensic evidence collection, preservation, and analysis. Data collection, logging, and virtual machine analysis are covered, considering physical infrastructure restrictions and cloud data transience. It evaluates Azure-native and third-party forensic tools and recommends methods that ensure effective investigations while adhering to legal and regulatory standards. It also describes how AI and machine learning automate data analysis in forensic investigations, improving speed and accuracy. This integration advances cyber forensic methods and sets new standards for future innovations. Unified Audit Logs (UALs) in Azure are examined, focusing on how Azure Data Explorer and Kusto Query Language (KQL) can effectively parse and query large datasets and unstructured data to detect sophisticated cyber threats. The findings provide a framework for other organizations to improve forensic analysis, advancing cloud cyber forensics while bridging theoretical practices and practical applications, enhancing organizations’ ability to combat increasingly sophisticated cybercrime. Full article
(This article belongs to the Special Issue Artificial Intelligence and Database Security)
Show Figures

Figure 1

16 pages, 4769 KB  
Article
Digital Forensics Readiness in Big Data Networks: A Novel Framework and Incident Response Script for Linux–Hadoop Environments
by Cephas Mpungu, Carlisle George and Glenford Mapp
Appl. Syst. Innov. 2024, 7(5), 90; https://doi.org/10.3390/asi7050090 - 25 Sep 2024
Viewed by 3506
Abstract
The surge in big data and analytics has catalysed the proliferation of cybercrime, largely driven by organisations’ intensified focus on gathering and processing personal data for profit while often overlooking security considerations. Hadoop and its derivatives are prominent platforms for managing big data; [...] Read more.
The surge in big data and analytics has catalysed the proliferation of cybercrime, largely driven by organisations’ intensified focus on gathering and processing personal data for profit while often overlooking security considerations. Hadoop and its derivatives are prominent platforms for managing big data; however, investigating security incidents within Hadoop environments poses intricate challenges due to scale, distribution, data diversity, replication, component complexity, and dynamicity. This paper proposes a big data digital forensics readiness framework and an incident response script for Linux–Hadoop environments, streamlining preliminary investigations. The framework offers a novel approach to digital forensics in the domains of big data and Hadoop environments. A prototype of the incident response script for Linux–Hadoop environments was developed and evaluated through comprehensive functionality and usability testing. The results demonstrated robust performance and efficacy. Full article
(This article belongs to the Section Information Systems)
Show Figures

Figure 1

29 pages, 1854 KB  
Article
Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
by Morgan Djotaroeno and Erik Beulen
Information 2024, 15(8), 505; https://doi.org/10.3390/info15080505 - 21 Aug 2024
Cited by 3 | Viewed by 3608
Abstract
Cybercrime is currently rapidly developing, requiring an increased demand for information security knowledge. Attackers are becoming more sophisticated and complex in their assault tactics. Employees are a focal point since humans remain the ‘weakest link’ and are vital to prevention. This research investigates [...] Read more.
Cybercrime is currently rapidly developing, requiring an increased demand for information security knowledge. Attackers are becoming more sophisticated and complex in their assault tactics. Employees are a focal point since humans remain the ‘weakest link’ and are vital to prevention. This research investigates what cognitive and internal factors influence information security awareness (ISA) among employees, through quantitative empirical research using a survey conducted at a Dutch financial insurance firm. The research question of “How and to what extent do cognitive and internal factors contribute to information security awareness (ISA)?” has been answered, using the theory of situation awareness as the theoretical lens. The constructs of Security Complexity, Information Security Goals (InfoSec Goals), and SETA Programs (security education, training, and awareness) significantly contribute to ISA. The most important research recommendations are to seek novel explaining variables for ISA, further investigate the roots of Security Complexity and what influences InfoSec Goals, and venture into qualitative and experimental research methodologies to seek more depth. The practical recommendations are to minimize the complexity of (1) information security topics (e.g., by contextualizing it more for specific employee groups) and (2) integrate these simplifications in various SETA methods (e.g., gamification and online training). Full article
Show Figures

Figure 1

Back to TopTop