Computer and Information Science; Vol. 14, No. 2; 2021
ISSN 1913-8989
E-ISSN 1913-8997
Published by Canadian Center of Science and Education
Cyber Security amid COVID-19
Hussin J. Hejase1, Hasan F. Fayyad-Kazan2, Ale J. Hejase3, & Imad A. Moukadem4
1
IEEE Senior Member, Senior Researcher, Prof. Business Administration, Beirut, Lebanon
2
Department of Management of Information Technology, Al Maaref University, Beirut, Lebanon
3
AKSOB, Lebanese American University, Beirut, Lebanon
4
Department of Computer Science, Al Maaref University, Beirut, Lebanon
Correspondence: Hussin J. Hejase, IEEE Senior Member, Senior Researcher, Prof. Business Administration,
Beirut, Lebanon.
Received: January 6, 2021
doi:10.5539/cis.v14n2p10
Accepted: February 15, 2021
Online Published: March 10, 2021
URL: https://doi.org/10.5539/cis.v14n2p10
Abstract
COVID-19 pandemic obliged thousands of companies pertaining to all economic sectors to undergo the
transformation from on-board work to working from home. Along such rush, the probability for companies being
hacked incremented many folds. According to VMware cybersecurity strategist Tom Kellermann, quoted in
Menn (2020), ―There is a digitally historic event occurring in the background of this pandemic, and that is there
is a cybercrime pandemic that is occurring‖ (para 5). In fact, Software and security company VMware Carbon
Black declared during April, ―that ransomware attacks it monitored jumped 148% in March from the previous
month, as governments worldwide curbed movement to slow the spread of the novel corona virus‖ (Para 4). On
the other hand, Anft (2020) reported that ―more than 500 educational institutions, including colleges and K-12
schools, faced ransom attacks in 2019‖ (para 2). This paper uses a descriptive qualitative approach to shed light
on the aforementioned subject depending on reported secondary literature about the topic, and offers an analysis
to pinpoint weaknesses and barriers, as well as best practices to counterattack the breaches to cybersecurity in
organizations. The outcomes serve as an eye opener for security officers in charge of the safety of organizational
intellectual properties and stimulates organizations to adopt protection systems and safety practices.
Keywords: cybersecurity, APT, ransomware, pandemic, hacking, deterrence
1. Introduction
Cybersecurity has undoubtedly gained importance and has become a priority matter of both private and public
concerns. The year 2020 witnessed an increase in cyberattacks and an increment of ransomware incidents that
Marr (2020, para 1) asserts the critical role that cybersecurity plays in protecting the individual‘s privacy, rights,
freedoms, and practices up to and including his/her physical safety. Moreover, with the advent of COVID-19
pandemic, there is an increase movement of global transformation of physical and vital infrastructure to online.
The transformation to online is therefore more vulnerable and open to digital attacks, to data breaches (leak of
personal information and ransomware) and up to cyberwar between countries and terrorism. The attacks are
more persistent and the impact is bigger, and ―there‘s an increasing awareness of political interference and
state-sanctioned cyberattacks‖ (Marr, 2020, para 1). Furthermore, Menn (2020), quoting Tonya Ugoretz, a senior
cyber official with the US Federal Bureau of Investigation (FBI), ―that incoming reports about hacking had
multiplied three- or four-fold during the outbreak‖ (para 7). Moreover, Rob Lefferts, a cybersecurity executive
with Microsoft, said ―the company was seeing an upswing in the volume of digital breaches in the same places
the disease was spreading the most quickly‖ (ibid, para 7).
The situation is actually very serious as Milkovich (2020) reports that since COVID-19 emergence, the ―FBI
reported a 300% increase in reported cybercrimes‖ (para 6) and consequently ―approximately $6 trillion is
expected to be spent globally on cybersecurity by 2021‖ (para 9), especially knowing that the ―connected
Internet of Things (IoT) devices will reach 75 billion by 2025‖ (para 10). Forsdick & Lawrence (2020) agree to
the aforementioned and add that ―the mass switch to remote working, a hike in opportunistic cyber-attacks and
tighter budgets have all contributed to the challenges of today‘s IT security chiefs. Chief information security
officers (CISOs) have faced more disruption than most as a result of the Covid-19 crisis‖ (Para 1-2). On the
other hand, the opportunity of working from home has become popular by many. In fact, Choudhury‘s (2020)
10
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
research added insight by answering the question ―Do we really need to be together, in an office, to do our work?
(p. 1).‖ During the pandemic lockdowns, according to Choudhury, ―We learned that a great many of us don‘t in fact
need to be co-located with colleagues on-site to do our jobs‖ (p.1). However, such move brought forward multiple
security challenges. According to Forsdick & Lawrence (2020), ―It‘s no longer a case of protecting the office
network; now every employee‘s home offers a new entry route for potential cyber-attacks‖ (para 2). As a
consequence, cyber-criminals jumped into the opportunity. In fact, the ―IT security service company Barracuda
Networks recorded a 600% spike in opportunistic phishing attacks during the first few months of the pandemic‖
(ibid, Para 3). Hence, as long as the pandemic continues around the globe, cybersecurity problems will build-up
to cause continuous economic problems at thousands of companies, which have led and will continue to lead to
reduced budgets and the need to preserve cash.
The objective of this paper is threefold:
1.
Shed light on the status-quo of cybersecurity.
2.
Expose best practices to build resilience against cyberattacks.
3.
Explore the implications to stakeholders.
This paper consists of five sections. The first section introduces the background and objectives of the paper. A
review of theoretical models is presented in the second section of the article. What was done in this part was a
comprehensive study of related theoretical models based on which one may examine and support the main
variables from different perspectives including behavioral (trust), attitudinal (organizational motivation,
technology acceptance), governance (agency theory), and technical (advanced persistent threats). In the third
section, the methodology of the paper is covered. The fourth section is pursuing the main goal of the paper:
assessing the status quo of cybersecurity based on statistical facts reported from many well- known sources
about ICT progress and the recurring security issues which accompany such progress. The statistical evidence is
validated by extracting the facts from original sources. In the last section, conclusion and recommendation are
offered as a base that may support interested policy making parties.
2. Theoretical Foundations
Information and Communications Technology (ICT) pervades billions of lives across the globe. Tables 1 and 2
depict the latest statistics on internet users and social media players worldwide. Such data is necessary to stress
both the importance of ICT and the human element in the role of creating awareness for cybersecurity and in the
planning of security policies to deter hackers and other malicious players around the globe. Furthermore, the
aforementioned are fundamental to justify relying on theoretical foundations to deal with cybersecurity issues. In
fact, Geers (2011) stresses the fact that ―a reliable connection to the Internet is more important than the power of
one‘s computer and provides infinitely greater utility to the user‖ (p. 20).
Table 1. Internet Users Globally
There are 4.66 billion internet users in the world today.
The global number of internet users grew by 321 million in the period 2019-2020, that is, at an annual rate
of 7% or more than 875 000 new users each day. However, such growth is higher in many developed
countries.
The average worldwide internet user spends about 7 hours online daily.
Overall, the global internet users, in the year 2020, will spend more than 1.3 billion years of human time
online.
Source: Datareportal, 2020 (October).
Table 2. Social Media Users Globally
There are 4.14 billion global social media users today – a 60% of globe‘s population (Kemp, 2020).
The number of global social media users grew by 453 million in the period of 2019-2020.
The global growth of social media users is at a rate of about 12 percent per year.
A social media user has, on the average, an account on 8.3 different social platforms.
Kemp (2020) citing GlobalWebIndex, reports that the average global user spends 2 hours and 24 minutes
on social media each day, which adds up to more than 10 billion hours every day.
Source: Datareportal, 2020 (October).
11
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Furthermore, Geers (2011) stresses the strategic outlook of the connected world emphasizing ―Together,
computers and computer networks offer individuals, organizations, and governments the ability to acquire and
exploit information with unprecedented speed. In business, diplomacy, and military might, this translates into a
competitive advantage, suggesting that brains will beat brawn with increasing frequency over time and that
computer resources will continue to play a central role in future human conflict‖ (p. 20). However, over time, the
criminalization of ICT systems‘ use has led to a serious threat of the security of data. In addition, Baronienė &
Žirgutis (2017) warn that ―Globally growing trend of cyber security incidents, increasing cyber-attacks statistic
data shows growing level of concern at the international and at the national level‖ (p. 454).
Next, an exposition of theories related to curbing malicious behavior and instigating the good use of ICT is
presented.
2.1 Trust Management
Organizations pertaining to all economic sectors are enabled by ICT systems. In addition, as organizations find
themselves within certain business ecosystems, the complexity of relations increases, as well as the need to trust
the security of the transactions that occur and which leads to closures of business deals or simply taking
decisions about the innovation, evolution and continuity of the organizations themselves. According to Moore
(2006), business ecosystems act as a booster to organizational inter-relations in the markets whereby managers
capitalize on business ecosystems to ―coordinate innovation across complementary contributions arising within
multiple markets and hierarchies within an agenda for co-evolution‖ (Moore, 2006, p. 2). Furthermore, Moore
contends that the aforementioned ―complementary advances often must co-evolve across company lines because
no one firm has all of the required specialized knowledge and managerial resources necessary for the whole
system‖ (p. 2). The scenario described above necessitates consistent and a high conservation of trust and security
among the different ecosystem partners. On this matter, Waidner (2005), Head of the IBM Privacy Research
Institute at the Zurich Research Lab, relates the world of business to the world of computer science. According to
him, the business perspective of security is related to risk management. Consequently, an ICT system provides
the adequate security if it keeps the risk for the business at an acceptable and handled level. Business risk is
concerned about the ―potential losses due to malicious acts by disgruntled employees, criminal hackers or
terrorists‖ (p.3). Though, accepting a risk and its level or not is a matter of a business decision. As for computer
science role, is in its potential and mitigation efforts of the challenges presented on ―How to describe the risk
level and how to demonstrate that an ICT system meets that level‖ (p. 3).
Based on the concept of ecosystems, the dependencies between enterprises are rapidly growing. And, an
increasing number of enterprises with different specializations, need to cooperate to provide a specific service.
Consequently, making ICT systems more secure and actually more challenging and difficult than ever, especially
that dependencies between enterprises is more complex and more dynamic in time. As a result, Waidner (2005, p.
2) asserts that the security boundaries between enterprises are further less strict. ―Back-end servers that were
carefully protected earlier through multiple protection layers are now directly exposed to the outside, as these
servers offer services to many different enterprises‖ (p.2). Moreover, according to Waidner, ―applications that
used to run on dedicated servers now run on a virtual, shared infrastructure, using physical resources that might
be spread worldwide‖ (p. 2).
Trust management, according to Blaze et al. (2009, p.44), is a fundamental requirement for business
communication policy among system elements, being within one company or multiple companies‘ ecosystem,
and demands careful checking and validation against specified policies of all credentials for access to all virtual
private service resources.
Moreover, Blaze et al. (2009), believe that the Global Information Grid (GIG), [a joint ongoing effort by the US
Department of Defense and Intelligence Community] architecture is a platform that encourages the studying of
trust in ―large-scale computing in general, not just in the military and government‖ (p. 44). However, Blaze et al.
show their concern for the fact that ―there is no unified policy-based mechanism through which to scalably
handle access control, intrusion detection, and other recovery mechanisms consistently across a large distributed
system‖ (p. 49). Consequently, Zhang and Joshi (2009, p. 422), based on their concern to have secure
interoperation among different independent systems, recommend the creation of multidomain security policy
which will mitigate the conflicts in policy specification and integration, policy analysis as per validation and
correctness among individual as well as integrated policies, and conflict resolution.
2.2 Protection Motivation Theory (PMT)
According to Rogers (1975, 1983), PMT encourages and motivates individuals to react in a protective way
towards a perceived threat. PMY was developed for the health promotion and disease prevention sector. PMY
12
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
consists of four pillars: (1) ―threat appraisal‖, (2) ―coping appraisal‖, (3) ―response efficacy‖ –and (4)
―self-efficacy.‖ The first estimates the threat scale, the second appraises and understands the threat, the third
identifies process to mitigate the threat, and the fourth motivates individual‘s own ability to implement the
required actions to mitigate the threat. Maddux and Rogers (1983) found self-efficacy to be ―the most powerful
predictor of behavioral intentions‖ (p. 476) that precede actual behavior. And PMT can be applied to ―any threat
for which there is an effective recommended response that can be carried out by the individual‖ (Floyd,
Prentice-Dunn & Rogers, 2000, p. 409). Furthermore, Bavel et al. (2019) and Briggs et al. (2019) assert that
PMT can be used in the design of directed motives to improve an individual‘s behavior when dealing with online
security. According to Bavel et al. (2019), PMT posits that two appraisal processes are carried out when people
are facing a threatening event. the first is focused on the threat itself (appraisal) and the second is directed toward
the ability to act against that threat (coping). The aforementioned ―affects their intention to take precautionary
action and results in adaptive or maladaptive behaviors vis-à-vis the threat‖ (p. 30). Moreover, Sommestad,
Karlzén & Hallberg (2015) researched how to apply PMT to assess how its efficacy is influenced by the
information security behavior it is applied to. Indeed, it explains information security behavior better if three
conditions exist: the first is when: the individual‘s behavior is voluntary, the second is to what extent the ―threat
and coping‖ method is concrete or specific, and the third is when information security threat is directed to the
individual him/herself. However, Westcott, Ronan, Bambrick & Taylor (2017, p. 3) believe that a robust
self-efficacy is more likely to motivate protective action timeliness, to influence the magnitude of responsiveness
to information, and to promote the plausibility of taking effective remedial action.
2.3 Technology Acceptance Model (TAM)
Davis, Bagozzi & Warshaw (1989) contend that TAM has been adapted from the Theory of Reasoned Action
(TRA) regarding beliefs, attitude, intention and behavior for modeling user acceptance of information systems.
Worth noting that TRA is a social psychology model that examines the key determinants of intended behaviors.
According to TAM, an individual‘s performance of a particular behavior is determined by his/her behavioral
intention to perform the behavior and behavioral intention is determined by multiple factors including a person‘s
attitude and subjective norms (Davis et al., 1989).
Jones et al. (2010) suggest that the ―basic premise of the Technology Acceptance Model is that the more
accepting users are of new systems, the more they are willing to make changes in their practices and use their
time and effort to actually start using the system‖ (p. 10). Davis (1989) posited that the perceptions of ease of use
and usefulness were key indicators of consumer‘s intention to adopt a new technology. Along this premise, Jones
et al. (2010) found in their research that top management commitment and training the end-users will promote
employee adoption, use and compliance with the corporate information systems security measures and to
encourage positive attitudes toward these measures (p. 14). On the other hand, Seuwou et al. (2016) assert that
―on several instances, users are not willing to use information systems which if used will produce remarkable
performance gains‖ (p. 2). Therefore, user acceptance is essential and a critical success factor in achieving either
failure or success of any IT project including IT security practices. In fact, according to Shim (2015), ―The
security of information systems is compromised if a firm's employees are poorly motivated and do not properly
act to keep up with new security patches and updates in the erroneous believe that they are already
well-protected through the deployment of technical security solutions. In this case, even if firms employ various
technical security controls, strong information security cannot be achieved without addressing a moral hazard
problem‖ (p. 11).
2.4 Agency Theory
Agency theory, according to Eisenhardt (1989), is concerned with the universal and pervasive ―agency
relationship‖ in which a person of authority (i.e., the principal: the board, a manager, or a supervisor among
others) assigns tasks to another person or persons (i.e., the agent: a manager, a supervisor, an employee among
others). Actually, what triggers the agency problem is the conflict of interest between the principal (i.e., the
Board) and the agent (i.e., Management) in terms of delegated tasks or work from the principal to the agent. This
occurs because the aforementioned parties (the principal and the agent) may have differing levels of risk
acceptance. For example, Posthumus & von Solms (2008) explain the case in terms of IT-related decisions, that
is when the board (principle) questions and may not be able to verify the management (the agent) decisions and
actions to effectively portray the best interests of the organization. The authors believe that the aforementioned
―may be due to moral hazard and adverse selection, explained through agency theory. Moral hazard may occur
because the board may not necessarily be involved in ensuring that IT delivers its said value. Additionally,
adverse selection may occur because the board may not know the full degree of the organization‘s reliance on IT‖
(ibid, p. 689). Even more, according to Shim (2015), based on the Agency theory (or principal-agent (P-A)
13
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
theory), ―the low effectiveness of security measures might be the outcome of moral hazard, which results in
suboptimal efforts of users to maintain IT systems appropriately‖ (p. 1). Therefore, the observed ineffectiveness
is detected by the Agency theory identifying conflicting issues of cooperating parties and having conflicting
goals. For example, Herath & Rao (2009) explained inadequate cyber-security from a P-A perspective and
argued that security measures are ineffective due to misaligned incentives and moral hazard of employees.
The conflict between board and management, if continuous, hinders the outcomes of the Internet-based
applications and services, which have greatly helped accelerate technological and organizational innovation, and
become a main source of vulnerability (Shim, 2015). In addition, bringing the conflict down the hierarchies of
command will lead that potential gains from Internet-based technological innovation to be partially offset by
significant losses from cyber-security incidents (Hovav and Han, 2013).
2.5 Advanced Persistent Threats (APT)
Rouse (2020), Khan and Khan (2019) and Gonzalez (2014) define an advanced persistent threat (APT) as a long
term and directed cyberattack in which an intruder (unauthorized person) succeeds to penetrate a network
whereby he/she remains there undiscovered for a long period of time.
Hejase, Fayyad-Kazan and Moukadem (2020) warn that the field is open to advanced persistent threats (APTs)
whereby the outcomes may become very costly to all institutions and governments across the globe. In fact,
Positive Technology Security (2019) reports that ―Gartner estimates that worldwide expenditures on digital
security will exceed $124 billion this year (2019). But attackers rarely give up on a target even if their first attempts
are unsuccessful‖ (para 1). Moreover, FireEye statistics (2019), report that ―64% of companies attacked in 2018
were attacked again in the following 19 months‖ (p. 10).
Accordingly, APTs are complex cyberattacks that use multi-stage techniques to target and compromise systems
that often go undetected for months (Hejase et al., 2020, p. 1, citing Rouse, 2020 and Gonzalez, 2014).
Therefore, it is a highly challenging task to exactly estimate APT cyberattack costs. in fact, Positive Technology
Security (2019), contends that ―One reason is the difficulty of putting a value on the unique software used by
criminal groups‖ (para 5). However, Table 3 herein provides an example of APT costing.
Table 3. Cost of an APT Attack
90% of the APT groups use ―Spear Phishing‖ as an effective way to penetrate a company's internal
network. The cost of tools used in the creation of malicious attachments (not including the cost of
exploits for ―zero-day vulnerabilities‖), cost about two thousand US dollars.
A cost ranging from USD8000 to USD40 000 is incurred after penetrating the internal network. 50% of
APT groups use legitimate administration tools and commercial penetration testing software.
Starting at an estimate of USD55 000 is the cost of the tools needed for a banking attack.
Much more expensive campaigns like cyberespionage would cost at least USD500 000 to start.
Source: Positive Technology Security (2019, Para 5).
Security Magazine (2017) citing Michel Cukier, Clark School assistant professor and an affiliate of the Clark
School's Center for Risk and Reliability and Institute for Systems Research, asserts that "Often intruders set up
'back doors'—undetected entrances into the computer that they control—so they can create 'botnets' for profit or
disreputable purposes" (para 9). According to a study by Michel Cukier, ―A botnet is a collection of
compromised computers that are controlled by autonomous software robots answering to a hacker who
manipulates the computers remotely. Botnets perpetrate fraud or identity theft, disrupt other networks, and
damage computer files, among other things‖ (University of Maryland, 2021, para 9). Indeed, Jeun, Lee and Won
(2012), confirm that APT cyberattacks are sophisticated and advanced, that even organizations equipped with
most advanced cyber defenses are unguarded and at risk. For example, well-known corporations like Google,
Adobe Systems, Juniper Networks and Symantec were all victims of an APT attack called Operation Aurora
(Fortinet, 2013; Radzikowski, 2015; Khan and Khan, 2019; Matthews, 2019). On the other hand, Hutchins,
Cloppert and Amin (2011) contend that defenders against APTs can generate metrics to build systems‘ resiliency
by measuring the performance and effectiveness of defensive actions against the cyberattacks and intruders.
3. Methodology
This paper uses a qualitative descriptive research approach based on secondary data. Due to the sensitivity of the
topic and the abundant sources of specialized reports online and the continuous generation of research on
14
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
cybersecurity. The authors had to first review the reports and blogs and from there seek the original sources of
the primary data exposed. This way, the authors accessed the original statistics as well as the newer information
provided whereby analytical arguments are presented. Furthermore, reported primary data from interviews with
experts on cybersecurity were also used to validate the facts being discussed. Therefore, data were collected for
this research from books, journals, magazines and Internet websites. According to Ghauri & Gronhaug (2005),
―research design correlates with the choice of strategy to be implanted in collecting the data needed to answer
the stated research objective‖ (p. 31). Furthermore, Hejase & Hejase (2013) contend that using descriptive
research is highly suitable for structured problems, that is well understood and documented. An inductive
analysis is performed on the secondary data collected to build up a status-quo platform based on theoretical
models as foundation and then based on the content supported with latest statistical facts, mitigation scenarios
are presented and best practices are brought forward.
4. Statistical Facts and Discussion
This section includes reported statistics that support the objective of this paper and provide a clear view of the
cybersecurity field (as a whole) along with the overall impact of cyberattacks. For this purpose, based on Sobers‘
(2020) report and adding to it the specific references, this section presents a compilation of facts reported from a
number of valid and scientifically supported sources. Reported statistics are organized in a set of Tables 4-8 and
Figures 1-3 for the sake of clarity and organization.
Table 4. Cyberattacks and Cybersecurity
Kim et al. (2018) from Gartner Research report that the forecasted worldwide information security
market is to reach $170.4 billion in 2022.
Cybint Solutions found that 64% of companies have experienced web-based attacks. 62% experienced
phishing & social engineering attacks. 59% of companies experienced malicious code and botnets and
51% experienced denial of service attacks in 2018 (Milkovich, 2020).
According to Bissell et al. (2019) quoting Accenture: 68% of business leaders assert an increase in their
cybersecurity risks, a 67% increase of security breaches (2014-2019) and a 72% increase in cybercrime
in the same period.
There is an increase in the average annual cost of cybercrime (see Figure 1) (Bissell et al., 2019).
There is an increase in the average annual cost of cybercrime by country (see Figure 1) (Bissell et al.,
2019).
There is an increase in the average annual cost of cybercrime by type (see Figure 2) (Bissell et al.,
2019).
RiskBased Security reports that Data breaches exposed 4.1 billion records in the first half of 2019
(Cyber Risk Analytics, 2020).
- The number of records exposed in the first quarter of 2020 skyrocketed to 8.4 billion - a 273% increase
compared to the same period in 2019 and the most records exposed in any first quarter period since
the company began tracking data breaches in 2005.
- Based on the above, about 70% of reported breaches were due to unauthorized access to systems or
services, while about 90% of the records exposed were attributable to exposing/publishing data
online.
15
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Figure 1. The average annual cost of cybercrime by country (% increase)
(Source: Bissell et al., 2019, p. 13)
Figure 2. Average annual cost of cybercrime by type of attack (2018, total = USD13.0 million)
(Source: Bissell et al., 2019, p. 17)
Table 5. Cyberattacks and Cybersecurity
-
Verizon (2020) reports that breaches were classified as follows; Financially motivated (86%), 43% web
applications (43%), stolen or used credentials (37%), malware/ransomware (27%), phishing (22%), and
25% were motivated by espionage. Furthermore, Verizon reports:
Hacking is featured in 45% of breaches, while malware accounted for 17% and phishing or social
engineering amounted to 22%, respectively.
Breaches related to the cryptocurrency mining malware are accounted for as follows: 2.5% of malware
among breaches and only 1.5% of malware for incidents. About 10% of the organizations received
cryptocurrency mining malware however, these were blocked at some point throughout the course of the
year.
Kaplan (2020) quoting Semantec, the top malicious email attachment types are: .doc and .dot (both make
up 37%) and .exe (19.5%, as next highest).
16
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
According to Bluerock (2020), a Cyber Defense consultancy in Scotland, 46% of businesses and 26% of
charities report having cybersecurity breaches or attacks in the year extending from August 2019 to
August 2020. Moreover, 1 in 5 businesses lose money or data due to a breach or attack.
John et al. (2020) confirm that there has been a change in the nature of cyberattacks since 2017. Over this
year, phishing attacks increased from 72% to 86%, viruses or other malware decreased from 33% to 16%
(see Figure 3).
Figure 3. Percentage of identified types of breaches or attacks in the last 12 months (2019-2020)
(Source: Johns et al., 2020, p. 36)
Table 6. Cyberattacks and Cybersecurity: IT Professionals Voice
92% of IT professionals give a vote of no trust to their organizations as for their preparation to offer
public cloud services security. Also, 75% of IT professionals view the public cloud as more secure
than their own data centers.
About 80% of IT professionals say that recent data breaches experienced by other businesses have
motivated and increased their organization‘s focus on securing data moving forward.
78% of organizations use more than 50 discrete cybersecurity products to address security issues and
37% use more than 100 cybersecurity products.
Organizations which discovered misconfigured cloud services experienced 10 or more data loss
incidents in the last year.
59% of organizations shared that employees with privileged cloud accounts have had those
credentials compromised by a spear phishing attack.
Source: Security Magazine, 2020.
Table 7. Cyberattacks and Cybersecurity: Employees Behavior
According to Securonix, roughly 80% of dissatisfied employees (and therefore leaving the
organization) will try to take proprietary data with them.
43.75% of employees or other internal entities forwarded content to personal emails.
16% abused collaboration privileges (including cloud).
10% performed downloads of aggregated data (including data on analyzed attacks).
Unauthorized removable storage devices (USB, external hard disk, …) are also used to swipe data.
Source: Osborne, 2020.
17
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Table 8. Cyberattacks and Cybersecurity: End Users Practices
A Google (2019) survey found that at least 65% of people reuse passwords across multiple sites.
Based on LastPass (2019) survey, 91% of respondents claim to understand the risks of reusing
passwords across multiple accounts, but 59% admitted to practicing it anyway.
Microsoft (2020) announced that 44 million accounts were subject to takeover due to compromised
or stolen passwords.
LastPass (2019) report finds that an employee reuses, on the average, each password as many as 13
times. Also, Jacobson (2020) reports 14 times.
According to Jacobson (2020), 72% of persons reuse passwords in their personal life while about
50% of employees perform very simple change to their company passwords (change or add a digit
or character) when updating every 90 days. A fact that keeps the threat.
73% of end users utilize same passwords in both their work and personal accounts.
Unauthorized removable storage devices are commonly used to swipe data
81% of hacking is related to weak passwords.
Security Magazine (2019) found that 76% of millennials recycle their passwords.
4.1 Facets of Cybersecurity
There are many important facets to cybersecurity, which are covered in Table 9.
Table 9. Facets to cybersecurity
No. of Facets
5
3
3
3
5
9
The Facets
Cyber targeting ―Kill Chain‖
(1) Positive identification of targets, (2) Location
of targets,
(3) Attribution of attack,
(4) Capability/target pairing, and
(5) Assessment of potential collateral damage‖
Systems security
1. Confidentiality
2. Integrity
3.Availability
System Security
1. Physical security
2. Cybersecurity
3. Security awareness
Systems security
1.Education & Governance
2.Security Monitoring & Response
3.Data Management & Backup
Data Security
1. Malicious attacks
2. Unauthorized access
3. Unusual extraction
4. Unintended use
5. Unexpected dissemination
Human Factor
1. Security procedures
2. Information sharing
3. Security culture
4. Physical environments
5. Work loads
6. Passwords
7. Threat awareness
8. Personality
9. Incident management analysis
Reference
Smart (2011)
Zissis & Lekkas (2012); Baronienė &
Žirgutis (2017); Geers (2011)
Coleman Technologies (2020)
Bluerock (2020)
de Montcheuil, Yves (2015)
Ritchie (2019); Radzikowski (2015);
Coleman Technologies (2020); Osborne
(2020); Jacobson (2020)
Table 9 shows a sample of facets to cybersecurity, which represent the many different schemes adopted to face
cyberattacks since these were detected. Different researchers concentrate on different aspects of the value-chain
characterizing cyber security. According to Smart (2011), an updated United States Department of Defense Joint
18
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Staff methodology ‗JP 3-60‘ [Kill Chain] should ―introduce the concepts of an adversary‘s cyber center of
gravity and a cyberspace joint operations area. An adversary‘s cyber presence consists of computers, information
systems, hardware, online personas and so forth, which may be geographically separated from his physical
center of gravity. Once planners identify the cyber center of gravity (a critical point—a source of power for the
adversary‘s cyber operations), they can target it‖ (p. 72).
Coleman Technologies (2020) used a three-phase approach as depicted in Table 9. The purpose is to mitigate and
stop intrusions, continuously innovate upgrades and updates and patches that serve to take care of security issues
intrinsic in the software solutions, using virtual private networks (VPNs), and perform a thorough and full
security audit. Nevertheless, human capital awareness is a must with special emphasis Coleman Technologies,
2020) on: ―password hygiene; data security practices; secure processes; access control standards; social media
Use; and conformity to policies‖ (para 6). While if the concern is data security, then de Montcheuil (2015)
proposed five concerns (also refer to Table 9) and recommended that system administrators must consider first
the security breaches by the human factor, that is, keeping out persons with malicious intentions to gain access to
data. Therefore, system administrators need to ―deploy ‗perimeter protection technologies‘, the proper
management of user accounts and permissions [data access, extraction, use and dissemination] and a wide range
of intrusion detection that detect attacks and shut down accesses when needed‖ (para 2).
As many researchers agree, the human factor within organizations must be the primary target for awareness and
compliance (Ritchie, 2019; Radzikowski (2015); Coleman Technologies (2020); Osborne, 2020; and Jacobson,
2020). In fact, Human factors consultant Amanda Widdowson (quoted by Richie, 2019) contends that ―In terms
of cybersecurity, what is harder to control is the human element. You can control the technical aspect a bit more.
Machines are a bit more predictable: you know what they are going to do. People — less so‖ (Para 2).
Capitalizing on the aforementioned facts and based on her experience helped her to develop an approach
centered on human knowledge, she explains. ―For part of my career I was involved in rail incident investigations
for London Underground. I‘ve essentially applied a knowledge of human error, how people‘s actions contribute
to incidents — and how you can mitigate that — to cybersecurity‖ (Para 2). Consequently, from that perspective,
―Widdowson defines a checklist of nine elements of human behavior that all tech leaders need to keep in mind.
Crucially, these all relate to unintended harm caused by employees rather than deliberately malevolent acts but
are no less important‖ (Para 5). Worth noting that when ―organizations analyze security threats or breaches, they
often do so from a technology perspective. However, a human factors approach should also be part of the
toolbox. Moreover, even if such an expert is not available, individuals should always ensure they include a
human factors checklist within their analytical framework‖ (Para 25-26). The aforementioned fits John et al.‘s
(2020) survey results about organizational response to disruptive breaches or cyberattacks in the UK. Figure 4
shows that the first step towards cybersecurity was providing additional staff training and communications.
Figure 4. Percentage of organizations that have done proactive actions since their most disruptive breach or
attack during the year of 2019-2020
(Source: Johns et al., 2020, p. 51)
19
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
5. Conclusion and Recommendation
Today‘s organizations will continue to monitor, detect and eliminate cyberattacks and intruders‘ threats provided
proactive planning is practiced. Nevertheless, Radzikowski (2015) stresses the fact that as means and methods
are available to within the hacker community, an increasing number of organizations will be victimized to
targeted cyberattacks and suffer potentially irrecoverable losses.
Lymer (2013) warns since 2013 that the threat landscape has progressed from simple ―script kiddies‖ to hackers
to insiders to today‘s state-sponsored attacks, where organizations of all sorts are attacked because of ―who they
are, what they do and the value of their intellectual property (IP)‖ (para 2). On the other hand, James Holley,
leader for Ernst & Young LLP‘s Information Security Incident Response services and co-author of the book
―Responding to Targeted Cyberattacks‖ (ISACA, 2013), asserts that ―There are no universal solutions to prevent
being infiltrated,‖ (Lymer, 2013, para 3). Furthermore, Holley contends that ―In this rapidly evolving threat
landscape, information security professionals need to adopt the mindset that their network is already
compromised or soon will be‖ (para 3).
ISACA (2013) recommends five tactics every organization should know: (1) Supporting and developing the
organizational human capital. Indeed, Microsoft (2020) stresses the fact that human resources are considered
critical success factor, among others, in the risk management program of an institution.
2. Broader organizational attention. Cyberattacks are three-pronged problem: a business, a people, and a
technology problem. Microsoft (2020) adds the ―legal dimension‖ (p. 69).
3. Organizational success depends on increasing the end-user‘s awareness and education. the user education and
awareness are critical to organizational success.
4. Organizational past prevention strategies are not enough for today‘s issues. Now-a-day‘s strategy needs to be:
―Complicate – Detect – Respond – Educate – Govern.‖
5. The new strategy to face cyberattacks includes four emerging capabilities:
―a. Centralized log aggregation and correlation,
b. Ability to conduct forensic analysis across the enterprise,
c. Ability to sweep the enterprise for indicators of compromise,
d. Ability to inspect memory to detect malicious code‖ (para 4).
Organizations that perform ―advanced incident response planning‖ can significantly improve their chances of
early threat detection and assure more effective security solutions. The key to effective APT protection, detection,
and response is robust implementation of security ‗best practices‘ and offering continuous education to the
organization‘s most liable users to breaches. However, it is critical that an organization have a strong awareness
culture and having top management who are literate in technology as well as in information. Capitalizing on the
aforementioned, the organization will be able to proactively mitigate threats against the organizational
cybersecurity (Hejase et al, 2020). In fact, ―administrators must learn how to use emerging technology
effectively so that it actually provides additional protection‖ (Cobb, 2013, para 14). In addition, Hejase and
Hejase (2015) stress the fact that a joint effort by the government, businesses and educational institutions should
collaborate to at least start an awareness campaign that may ―reach all ears in order to get the terms cyberwarfare,
cyber-attacks, cybersecurity and cyber-weapons into the dictionary of everyday words, simply because the threat
of a cyber-attack is ever present and will not go away‖ (p. 87).
Moreover, Howard and Olson (2020) recommend the implementation of an adversary playbook ―to share threat
intelligence with trusted partners in a meaningful and efficient way‖ (p. 68). In fact, and according to Howard
and Olson, such adversary playbook ―collates all known intelligence on the hacker groups‘ attack sequence:
tactics, techniques, indicators of Compromise, attack time frame, and context about motivation as well as
attribution‖ (p. 60). The aforementioned is to enforce the implementation of intrusion kill chain strategies.
Finally, by adopting the adversary playbook construct, cyber intelligence practitioners can leverage actionable
intelligence in a machine-readable format designed for the activities that are demonstrated in Table 10 herein.
20
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Table 10. Actionable Intelligence Activities
Intelligence collection and capture using an industry-accepted format.
Intelligence distribution by swapping information on adversary attack sequences in real time with
trusted partners.
Intelligence consumption sharing with partners in a format and language that facilitates automatic
processing.
DevSecOps security control deployment whereby network defenders understand the value of the
DevSecOps infrastructure-as-code philosophy.
Defensive campaign design and deployment capitalizing on sharing, communication and action
using the adopted adversary playbook concept.
Source: Howard and Olson, 2020, pp. 69-70.
References
Anft, M. (2020). An Emerging Threat: Ransomware. The Chronicle of Higher Education. Retrieved December 1,
2020, from
https://connect.chronicle.com/CHE-CI-WC-2020-EmergingCyber-TrendsSnapshot-PaloAlto_LP-CHE.
html
Baronienė, L., & Žirgutis, V. (2017). Cybersecurity Facets: Counterfactual Impact Evaluation of Measure
―Procesas LT‖ in Enterprises of the IT Sector. Journal of Security and Sustainability Issues, 6(3),
445-456. https://doi.org/10.9770/jssi.2017.6.3(10)
Bavel, R., Rodríguez-Priegoad, N., Vilab, J., & Briggsc, P. (2019, March). Using Protection Motivation Theory
in The Design of Nudges to Improve Online Security Behavior. International Journal of
Human-Computer Studies, 123, 29-39. https://doi.org/10.1016/j.ijhcs.2018.11.003
Bissell, K., LaSalle, R., & Dal Cin, P. (2019). The cost of cybercrime. Accenture. Retrieved November 27, 2020,
from
https://www.accenture.com/_acnmedia/PDF-96/Accenture-2019-Cost-of-Cybercrime-Study-Final.pdf#z
oom=50
Blaze, M., Kannan, S., Lee, I., Sokolsky, O., Smith, J. M., Keromytis, A. D., & Lee, W. (2009). Dynamic Trust
Management. Computer, 42(2), 44-52. https://doi.org/10.1109/MC.2009.51
Bluerock. (2020, August 31). Why multi-faceted cyber-attacks need a multi-faceted approach to cybersecurity.
Retrieved November 27, 2020, from
https://bluerockcd.co.uk/latest-news/multi-faceted-approach-to-cyber-security/
Briggs, P., Jeske, D., & Coventry, L. (2017). Behavior change interventions for cybersecurity. In: Linda Little,
Elizabeth Sillence and Adam Joinson (Eds.). Behavior change research and theory: Psychological and
technological perspectives, 115-136. Academic Press: Elsevier Inc.
https://doi.org/10.1016/B978-0-12-802690-8.00004-9
Choudhury, P. (2020). Our Work-from-Anywhere Future Best practices for all-remote organizations. Harvard
Business Review, (November-December, 1-11. Boston, Massachusetts: Harvard Business Publishing.
Cobb, M. (2013, May). The evolution of threat detection and management. Search Security. Retrieved December
5, 2020, from
https://searchsecurity.techtarget.com/tip/The-evolution-of-threat-detection-and-management
Coleman Technologies. (2020, May). Three facets of security to focus on. [Blog]. Retrieved November 25, 2020,
from https://www.colemantechnologies.com/blog/three-facets-of-security-to-focus-on
Cyber Risk Analytics. (2020). 2020 Q1 Report data breach quick view. Risk Based Security. Retrieved
November 28, 2020, from
https://pages.riskbasedsecurity.com/en/2020-q1-data-breach-quickview-report
DatarePortal. (2020, October). Digital around the world. Retrieved December 1, 2020, from
https://datareportal.com/global-digital-overview#:~:text=Roughly%204.66%20billion%20people%20ar
21
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
ound,twelve%20months%20to%20October%202020
Davis, F. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology.
MIS Quarterly, 13(3), 319-340. https://doi.org/10.2307/249008
Davis, F., Bagozzi, R., & Warshaw, P. (1989). User Acceptance of Computer Technology: A Comparison of Two
Theoretical Models. Management Science, 35(8), 982-1003. https://doi.org/10.1287/mnsc.35.8.982
de Montcheuil, Y. (2015, September 8). 5 facets of data security. InfoWorld. Retrieved November 25, 2020, from
https://www.infoworld.com/article/2980728/5-facets-of-data-security.html
Eisenhardt, K. M. (1989). Agency Theory: An Assessment and Review. Academy of Management Review, 14(1),
57-74. https://doi.org/10.5465/amr.1989.4279003
FireEye. (2019). M-trends 2019. Retrieved February 8, 2021, from
https://content.fireeye.com/m-trends/rpt-m-trends-2019
Floyd, D.L., Prentice-Dunn, S., & Rogers, R. W. (2000). A Meta-analysis of Research on Protection Motivation
Theory. J Appl Soc Psychol., 30(2), 407-29. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
Forsdick, S., & Lawrence, J. (2020, October). Security‘s new normal: How CISOs are coping with pandemic
challenges. I–Global Intelligence for Digital Leaders program, Fujitsu. Retrieved November 25, 2020,
from
https://www.i-cio.com/management/best-practice/item/adapting-to-a-new-security-environment-how-cis
os-are-coping-with-the-challenges-of-covid-19
Fortinet. (2013). Threats on the horizon: The rise of the advanced persistent threat. IT World Canada. Retrieved
December 2, 2020, from
https://s3-us-west-2.amazonaws.com/itworldcanada/archive/Documents/whitepaper/ITW274A_Persisten
t_Threats.pdf
Geers, K. (2011). Strategic cyber security. 2011 NATO Cooperative Cyber Defence Centre of Excellence
(CCDCOE). Retrieved December 1, 2020, from
https://www.law.upenn.edu/institutes/cerl/conferences/cyberwar/papers/reading/Geers.pdf
Ghauri, P., & Gronhaug, K. (2005). Research Methods in Business Studies, A practical Guide (3rd ed.). Harlow,
England: Pearson Education Limited.
Gonzalez, D. (2014). Internal and external risks. In: Managing online risk: Apps, mobile, and social media
security, Pages 25-52. Butterworth-Heinemann. https://doi.org/10.1016/B978-0-12-420055-5.00002-5
Google. (2019, February). Online security survey Google / Harris poll. Retrieved February 10, 2021, from
https://services.google.com/fh/files/blogs/google_security_infographic.pdf
Hejase, A. J., & Hejase, H. J. (2013). Research methods, A practical approach for business students (2nd ed.).
Philadelphia, PA, USA: Masadir Inc.
Hejase, A. J., Hejase, H. J., & Hejase, J. A. (2015). Cyber Warfare Awareness in Lebanon: Exploratory Research.
International Journal of Cyber-Security and Digital Forensics (IJCSDF), 4(4), 482-497.
https://doi.org/10.17781/P001892
Hejase, H. J., Fayyad-Kazan, H. F., & Moukadem, I. (2020). Advanced Persistent Threats (APT): An Awareness
Review. Journal of Economics and Economic Education Research (JEEER), 21(6), 1-8. Retrieved
February 8, 2021, from
https://www.abacademies.org/articles/Advanced-persistent-threats-apt-an-awareness-review-1533-3604
-21-6-202.pdf
Herath, T., & Rao, R. (2009). Encouraging Information Security Behaviors in Organizations: Role of Penalties,
Pressures and Perceived Effectiveness. Decision Support Systems, 47(2), 154-165.
https://doi.org/10.1016/j.dss.2009.02.005
Hovav, A., & Han, J. (2013). The Impact of Security Breach Announcements on the Stock Value of Companies
in South Korea. Korean Internet e-Commerce Association, 13(3), 43-67.
Howard, R., & Olson, R. (2020, Fall). Implementing intrusion Kill Chain Strategies: Creating Defensive
Campaign Adversary Playbooks. The Cyber Defense Review, 5(3), 59-74.
Hutchins, E. M., Cloppert, M. J., & Amin, R. M. (2011, January). Intelligence-driven computer network defense
informed by analysis of adversary campaigns and intrusion kill chains. Lockheed Martin Corporation.
22
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Retrieved December 4, 2020, from
https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-I
ntel-Driven-Defense.pdf
ISACA. (2013). Responding to targeted cyberattacks. ERNST & Young and ISACA. Rolling Meadows, IL, USA:
ISACA.
Jacobson, K. (2020, on April 30). Scary statistics about the password reuse problem [Blog]. Security Boulevard.
Retrieved December 2, 2020, from
https://securityboulevard.com/2020/04/8-scary-statistics-about-the-password-reuse-problem/
Jeun, I., Lee, Y., & Won, D. (2012). A practical study on advanced persistent threats. Computer applications for
security, control and system engineering. Berlin, Heidelberg: Springer, pp. 144-152.
https://doi.org/10.1007/978-3-642-35264-5_21
Johns, E., Williams, H., Clark, L., Leggett, O., & Shah, J. N. (2020). Cyber security breaches survey 2020:
Statistical release. UK Department for Digital, Culture, Media and Sport and Ipsos MORI.
https://doi.org/10.1016/S1361-3723(20)30037-3
Jones, C. M., McCarthy, R. V., Halawi, L., & Mujtaba, B. (2010). Utilizing the Technology Acceptance Model to
Assess the Employee Adoption of Information Systems Security Measures. Issues in Information
Systems, 11(1), 9-16. https://commons.erau.edu/publication/310
Kaplan, Y. (2020, November 13). How to prevent your email from getting hacked. Dunham Connect. Retrieved
December 3, 2020, from
https://dunhamconnect.com/blog/how-to-prevent-your-email-from-getting-hacked
Kemp, S. (2020, January 30). Digital 2020: 3.8 billion people use social media. Retrieved February 7, 2021,
from
https://wearesocial.com/blog/2020/01/digital-2020-3-8-billion-people-use-social-media
Khan, W. Z., & Khan, K. M. (2019, September). Advanced persistent threats through industrial IoT on oil
and gas industry. Global Foundation for Cyber Studies and Research (GFCyber). Retrieved December 1,
2020, from
https://www.researchgate.net/publication/335611873_Advanced_Persistent_Threats_Through_Industrial
_IoT_On_Oil_And_Gas_Industry
Kim, E., Gardner, D., Deshpande, S., Contu, R., Kish, D., & Canales, C. (2018, September 14). Forecast analysis:
Information security, worldwide, 2Q18 update. Gartner Research. Retrieved November 27, 2020, from
https://www.gartner.com/en/documents/3889055
LastPass. (2019). Global password use report, 3rd annual report. Retrieved February 10, 2021, from
https://www.lastpass.com/state-of-the-password/global-password-security-report-2019
Lymer, A. (2013, May 15). Five things every organization should know about detecting and responding to
targeted cyberattacks. Accounting Education. Retrieved December 5, 2020, from
http://www.accountingeducation.com/index.cfm?page=newsdetails&id=152472
Maddux, J. E., & Rogers, R. W. (1983). Protection Motivation and Self-Efficacy: A Revised Theory of Fear
Appeals and Attitude Change. J Exp Social Psychol, 19(5), 469-79.
https://doi.org/10.1016/0022-1031(83)90023-9
Marr, B. (2020, January 10). The 5 biggest cybersecurity trends in 2020 everyone should know about. Forbes.
Retrieved November 27, 2020, from
https://www.forbes.com/sites/bernardmarr/2020/01/10/the-5-biggest-cybersecurity-trends-in-2020-ever
yone-should-know-about/?sh=679eb0647ecc
Matthews, T. (2019, January 8). Operation aurora – 2010‘s major breach by Chinese hackers. Exabeam.
Retrieved December 3, 2020, from https://www.exabeam.com/information-security/operation-aurora/
Menn, J. (2020, April 17). Hacking against corporations surges as workers take computers home. Reuters:
Technology News. Retrieved December 1, 2020, from
https://www.reuters.com/article/us-health-coronavirus-cyber-corporations/hacking-against-corporationssurges-as-workers-take-computers-home-idUKKBN21Z0Y6
Microsoft. (2020). Microsoft digital defense report 2019. https://doi.org/10.1016/S1353-4858(20)30114-8
23
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
Milkovich, D. (2020, June 20). 15 Alarming cyber security facts and stats. Retrieved November 27, 2020, from
https://www.cybintsolutions.com/cyber-security-facts-stats/
Moore, J. F. (2006, March). Business Ecosystems and The View of The Firm. The Antitrust Bulletin, 51(1), 1-58.
https://doi.org/10.1177/0003603X0605100103
Osborne, C. (2020, May 20). ‗Flight risk‘ employees involved in 60% of insider cybersecurity incidents. Zero
Day. Retrieved December 3, 2020, from
https://www.zdnet.com/article/flight-risk-employees-involved-in-60-of-insider-cybersecurity-incidents/
Positive Technologies Security. (2019, August 14). Hack at all cost: putting a price on APT attacks. Retrieved
December 6, 2020, from
https://www.ptsecurity.com/ww-en/analytics/advanced-persistent-threat-apt-attack-cost-report/
Posthumus, S., & von Solms, R. (2008). Agency theory: Can it be used to strengthen IT governance? In: IFIP
international federation for information processing, volume 278; (Eds.) Sushil Jajodia, Pierangela
Samarati, Stelvio Cimato. Proceedings of the IFIP TC 11 23rd International Information Security
Conference, pp. 687-691. (Boston: Springer). https://doi.org/10.1007/978-0-387-09699-5_46
Radzikowski, S. (2015, October 8). Cybersecurity: Origins of the advanced persistent threat (APT). Retrieved
December 2, 2020, from
http://drshem.com/2015/10/08/cybersecurity-origins-of-the-advanced-persistent-threat-apt/
Ritchie, R. (2019, September 2019). Human factors in cyber-security: nine facets of insider threat. I–Global
Intelligence for Digital Leaders program, Fujitsu. Retrieved November 25, 2020, from
https://www.i-cio.com/management/insight/item/human-factors-in-cyber-security-nine-aspects-of-insider
-threat
Rogers, R. W. (1975). A Protection Motivation Theory of Fear Appeals and Attitude Change. J. Psychol, 91,
93-114. https://doi.org/10.1080/00223980.1975.9915803
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: a revised
theory of protection motivation. J. Cacioppo, R. Petty (Eds.), Social Psychophysiology, New York:
Guilford Press.
Rouse, M. (2020, August). Advanced persistent threat (APT). Tech Target. Retrieved November 28, 2020, from
https://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
Security Magazine. (2017, February 10). Hackers attack every 19 seconds. Retrieved December 1, 2020, from
https://www.securitymagazine.com/articles/87787-hackers-attack-every-39-seconds
Security Magazine. (2019). Majority of Americans recycle passwords up to four times. Retrieved February 8,
2021, from
https://www.securitymagazine.com/articles/90550-majority-of-americans-recycle-passwords-up-to-four
-times
Security Magazine. (2020). 78% of organizations use more than 50 cybersecurity products to address security
issues. Retrieved December 2, 2020, from
https://www.securitymagazine.com/articles/92395-of-organizations-use-more-than-50-cybersecurity-pro
ducts-to-address-security-issues
Seuwou, P., E. B., & Ubakanma, G. (2016, January). User acceptance of information technology: A critical
review of technology acceptance models and the decision to invest in information security. Proceedings
of the International Conference on Global Security, Safety, and Sustainability.
https://doi.org/10.1007/978-3-319-51064-4_19
Shim, W. (2015). Agency Problems in Information Security: Theory and Application to Korean Business. The
Journal of Internet Electronic Commerce Research, 15(5), 1-15.
Smart, S. J. (2011). Joint Targeting in Cyberspace. Air & Space Power Journal, (Winter), 65-75. USAF.
Retrieved December 2, 2020, from https://apps.dtic.mil/dtic/tr/fulltext/u2/a555785.pdf
Sobers, R. (2020, October 26). 110 Must-know cybersecurity statistics for 2020. VARONIS. Retrieved November
27, 2020, from https://www.varonis.com/blog/cybersecurity-statistics/
Sommestad, T., Karlzén, H., & Hallberg, J. (2015, January). A Meta-Analysis of Studies on Protection
Motivation Theory and Information Security Behaviour. International Journal of Information Security
and Privacy, 9(1), 26-46. https://doi.org/10.4018/IJISP.2015010102
24
http://cis.ccsenet.org
Computer and Information Science
Vol. 14, No. 2; 2021
University of Maryland. (2021). Hackers attack every 39 seconds. Retrieved February 8, 2021, from
https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds
Verizon. (2020). Data breach investigations report (DBIR) 2020.
https://doi.org/10.1016/S1361-3723(20)30059-2
Waidner, M. (2005, October). Security and trust management. European Research Consortium for Informatics
and Mathematics (ERCIM), number 63. Retrieved December 1, 2020, from
https://www.ercim.eu/publication/Ercim_News/enw63/EN63.pdf
Westcott, R., Ronan, K., Bambrick, H., & Taylor, M. (2017). Expanding Protection Motivation Theory:
Investigating an Application to Animal Owners and Emergency Responders in Bushfire Emergencies.
BMC Psychol, 5, 2-14. https://doi.org/10.1186/s40359-017-0182-3
Zhang, Y., & Joshi, J. (2009). Access Control and Trust Management for Emerging Multi-domain Environments.
Annals of Emerging Research in Information Assurance, Security and Privacy Services. S. Upadhyaya
and R.O. Rao, eds., Emerald Group Publishing, 2009, pp. 421-452.
Zissis, D., & Lekkas, D. (2012, March 3). Addressing Cloud Computing Security Issues. Future Generation
Computer Systems, 28(3), 583-592. https://doi.org/10.1016/j.future.2010.12.006
Copyrights
Copyright for this article is retained by the author(s), with first publication rights granted to the journal.
This is an open-access article distributed under the terms and conditions of the Creative Commons Attribution
license (http://creativecommons.org/licenses/by/4.0/).
25