Some aspects were identified as both relevant and
relatable. In general, we found out that employees’
awareness plays a vital role in supporting the
cybersecurity strategy among organizations and that
there is a strong relationship between awareness and
training among the employees’ perspectives. The
result is not particularly different from previous
studies conducted pre-pandemic, but it is an
important finding to highlight that cybersecurity
measures from a training perspective are highlighted
as vital in forced remote working contexts. Likewise,
since remote working is a trend to be pursued by
various organizations in the long run, a focus on the
perspective of employees in terms of awareness
within this context is important.
One of the key conclusions of this research is that
emotional factors, trust in cybersecurity
infrastructure, previous practices, training, security
fatigue, and improvements with gamification are core
to supporting the success of a cybersecurity program
in a remote work environment. We also found out that
trust in cybersecurity practices and infrastructures is
becoming an important building block for remote
workers, especially when autonomous technology
becomes more prevalent. As such, trust and
trustworthiness in cybersecurity are aspects that we
aim to address in our future work.
REFERENCES
Alexander, K. B., & Jaffer, J. N. (2021). COVID-19 and the
Cyber Challenge. The Cyber Defense Review, 6(2), 17-
28.
Bada, M., Sasse, A. & Nurse, J. R. C. (2015). Cyber
Security Awareness Campaigns: Why Do They Fail to
Change Behavior? International Conference on Cyber
Security for Sustainable Society
Bowen, P., Hash, J. & Wilson, M. (2006). Information
Security Handbook: A Guide for Managers, NIST
Special Publication 800-100
Bulgurcu, B., Cavusoglu, H. & Benbasat, I. (2010).
Information Security Policy Compliance: An Empirical
Study of Rationality-Based Beliefs and Information
Security Awareness, MIS Quarterly.
Chowdhury, N., Katsikas, S. & Gkioulos, V. (2022).
Modelling Effective Cybersecurity Training
Frameworks: A Delphi Method-Based Study,
Computers and Security, vol. 113.
CPNI (2020) Personnel Security Guidance on Remote
Working – A Good Practice Guide
D’Arcy, J., Hovav, A. & Galletta, D. (2009). User
Awareness of Security Countermeasures and Its Impact
on Information Systems Misuse: A Deterrence
Approach, Information Systems Research, vol. 20, no.
1, pp.79–98.
Furnell, S. M., Gennatou, M. & Dowland, P. S. (2002). A
Prototype Tool for Information Security Awareness and
Training, Logistics Information Management, vol. 15,
no. 5/6, pp.352–357.
Galanti, T., Guidetti, G., Mazzei, E., Zappalà, S., &
Toscano, F. (2021). Work from home during the
COVID-19 outbreak: The impact on employees’
remote work productivity, engagement, and stress.
Journal of occupational and environmental medicine,
63(7), e426.
Gartner. (2021b). Security Awareness Computer-Based
Training Reviews and Ratings. Available online:
https://www.gartner.com/reviews/market/security-awa
reness-computer-based-training [Accessed 9 April
2022]
GDPR. (2022). General Data Protection Regulation,
Available online: https://gdpr-info.eu/ [Accessed 30
March 2022]
Guo, H., Wei, M., Huang, P., & Chekole, E. G. (2021).
Enhance Enterprise Security through Implementing
ISO/IEC 27001 Standard. In 2021 IEEE International
Conference on Service Operations and Logistics, and
Informatics (SOLI) (pp. 1-6). IEEE.
ISO/IEC 27001. (2022). Information Security
Management, Available online: https://www.iso.org/
isoiec-27001-information-security.html [Accessed 30
March 2022]
Kajtazi, M., Cavusoglu, H., Benbasat, I. & Haftor, D.
(2018). Escalation of Commitment as an Antecedent to
Noncompliance with Information Security Policy,
Information and Computer Security, vol. 26, no. 2,
pp.171–193.
Kane G., Nanda, R., Phillips, A., Copulsky, J. (2021)
Redesigning the Post-Pandemic Workplace. MIT Sloan
Management Review.
Naidoo, R. (2020). A multi-level influence model of
COVID-19 themed cybercrime. European Journal of
Information Systems, 29(3), 306-321.
NIST. (2022). Cybersecurity Framework, Available online:
https://www.nist.gov/cyberframework [Accessed 28
March 2022]
Öğütçü, G., Testik, Ö. M. & Chouseinoglou, O. (2016).
Analysis of Personal Information Security Behavior
and Awareness, Computers and Security, vol. 56,
pp.83–93.
Parsons, K., McCormac, A., Butavicius, M., Pattinson, M.,
& Jerram, C. (2014). Determining Employee
Awareness Using the Human Aspects of Information
Security Questionnaire (HAIS-Q), Computers and
Security, vol. 42, pp.165–176
Pattinson, M., Butavicius, M., Ciccarello, B., Lillie, M.,
Parsons, K., Calic, D. & Mccormac, A. (2018).
Adapting Cyber-Security Training to Your Employees,
Proceedings of the Twelfth International Symposium
on Human Aspects of Information Security &
Assurance (HAISA 2018).
Pimple, K. D. (2002). Six domains of research ethics.
Science and engineering ethics, 8(2), 191-205.