Abstract
End-users are our first line of defense against cyber-attacks. The U.S. government has endorsed training videos that teach cyber hygiene best practices, aiming to harden our defenses. In this pilot study, we explored the effectiveness of those security training videos under the cover of an employee onboarding scenario and general computer competency questions. Masking the cybersecurity focus of this study was critical to prevent unnatural heightened vigilance. For example, increased awareness of cybersecurity threats can artificially increase sensitivity to phishing emails or identify malicious links. Participants’ cyber hygiene knowledge was assessed by pre- and post-tests after receiving the training. In addition, we measured behavioral onboarding task performance based on the training learning objectives. Our findings showed a lack of improvement in quiz knowledge and onboarding security activities after exposure to the training. We echo others in the literature by claiming the need for a paradigm shift in how traditional cybersecurity training is taught and how success is measured.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ulsch, N.M. (ed.): Cyber Threat! Wiley (2014). https://doi.org/10.1002/9781118915028
Chowdhury, N., Gkioulos, V.: Cyber security training for critical infrastructure protection: a literature review. Comput. Sci. Rev. 40, 100361 (2021). https://doi.org/10.1016/j.cosrev.2021.100361
Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33, 237–248 (2014). https://doi.org/10.1080/0144929X.2012.708787
Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36–45 (2018). https://doi.org/10.1016/j.jisa.2018.08.002
Chowdhury, N., Katsikas, S., Gkioulos, V.: Modeling effective cybersecurity training frameworks: a Delphi method-based study. Comput. Secur. 113, 102551 (2022). https://doi.org/10.1016/j.cose.2021.102551
Vishwanath, A.: Stop telling people to take those cyber hygiene multivitamins. In: Prepared for Evolving Threats, pp. 225–240. World Scientific (2020). https://doi.org/10.1142/9789811219740_0014
Morris, T.W., Still, J.D.: Cybersecurity hygiene: blending home and work computing. In: Patterson, W. (ed.) New Perspectives in Behavioral Cybersecurity. CRC Press, Boca Raton (2023)
Bogage, J.: Colonial pipeline CEO says paying $4.4 million ransom was ‘the right thing to do for the country’ (2021)
Prümmer, J., Van Steen, T., Van Den Berg, B.: A systematic review of current cybersecurity training methods. Comput. Secur. 136, 103585 (2024). https://doi.org/10.1016/j.cose.2023.103585
Craigen, D., Diakun-Thibault, N., Purse, R.: Defining cybersecurity. Technol. Innov. Manag. Rev. 4, 13–21 (2014). https://doi.org/10.22215/timreview/835
McCarthy, K.: Cybersecurity awareness training methods and user behavior. ProQuest Dissertations and Theses (2021)
Koutsouris, N., Vassilakis, C., Kolokotronis, N.: Cyber-security training evaluation metrics. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 192–197. IEEE, Rhodes (2021). https://doi.org/10.1109/CSR51186.2021.9527946
Van Steen, T., Norris, E., Atha, K., Joinson, A.: What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use? J. Cybersecur. 6, tyaa019 (2020). https://doi.org/10.1093/cybsec/tyaa019
Bada, M., Sasse, A.M., Nurse, J.R.C.: Cyber security awareness campaigns: why do they fail to change behaviour? (2019). https://doi.org/10.48550/ARXIV.1901.02672
Ghazvini, A., Shukur, Z.: Awareness training transfer and information security content development for healthcare industry. IJACSA 7 (2016). https://doi.org/10.14569/IJACSA.2016.070549
Kävrestad, J., Nohlberg, M.: Evaluation strategies for cybersecurity training methods: a literature review. In: Furnell, S., Clarke, N. (eds.) HAISA 2021. IFIP Advances in Information and Communication Technology, vol. 613, pp. 102–112. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81111-2_9
Deakin University Melbourne, Australia, Alruwaili, A.: A review of the impact of training on cybersecurity awareness. IJARCS 10, 1–3 (2019). https://doi.org/10.26483/ijarcs.v10i5.6476
Proctor, W.R.: Investigating the efficacy of cybersecurity awareness training programs. ProQuest Dissertations & Theses Global; SciTech Premium Collection (2016)
Vishwanath, A., et al.: Cyber hygiene: The concept, its measure, and its initial tests. Decis. Support. Syst. 128, 113160 (2020). https://doi.org/10.1016/j.dss.2019.113160
Nichols, A.L., Maner, J.K.: The good-subject effect: investigating participant demand characteristics. J. Gener. Psychol. 135, 151–166 (2008). https://doi.org/10.3200/GENP.135.2.151-166
Sharma, K., Zhan, X., Nah, F.F.-H., Siau, K., Cheng, M.X.: Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity. OCJ 1, 69–91 (2021). https://doi.org/10.1108/OCJ-03-2021-0009
Fahl, S., Harbach, M., Acar, Y., Smith, M.: On the ecological validity of a password study. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, pp. 1–13. ACM, Newcastle (2013). https://doi.org/10.1145/2501604.2501617
Cybersecurity Awareness. Security Awareness Hub: Select eLearning Awareness Courses for DOD and Industry (2014)
Basset, G., Hylender, C., Langlois, P., Pinto, A., Widup, S.: Data breach 2020 investigations report - verizon business (2020). https://www.verizon.com/business/en-gb/resources/reports/2020-data-breach-investigations-report.pdf. Accessed 10 Apr 2022
Still, J.D.: Cybersecurity needs you! ACM Interact. (May + June: Feature) 23, 54–58 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
The authors have no competing interests to declare that are relevant to the content of this article.
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Katsarakes, A., Morris, T., Still, J.D. (2024). Hidden in Onboarding: Cyber Hygiene Training and Assessment. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2024. Lecture Notes in Computer Science, vol 14728. Springer, Cham. https://doi.org/10.1007/978-3-031-61379-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-61379-1_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61378-4
Online ISBN: 978-3-031-61379-1
eBook Packages: Computer ScienceComputer Science (R0)