Home user security- from thick security-oriented home users to thin security- oriented home users

E. Kritzinger, S. H. Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

In the technological world in which we live, access to the Internet is no longer a luxury. Rather, it is a necessity and a lifeline to many. The Internet is used, amongst other things for obtaining information, for doing business and for social networking. However, along with increases in cyber activity come increases in cyber threats, attacks and incidents. Many home users are not technology savvy and, therefore, do not understand these cyber threats or how to protect themselves (and their information) while connected to the Internet. It is therefore vital that home users be assisted to ensure that they are 'cyber secure'. The paper proposes how a regulatory body, for example, an Internet Service Provider (ISP), can be involved to take over the majority of cyber security responsibilities for the home (end) user. This will transform a user from being a thick security-oriented user to being a thin security-oriented end user.

Original languageEnglish
Title of host publicationProceedings of 2013 Science and Information Conference, SAI 2013
Pages340-345
Number of pages6
Publication statusPublished - 2013
Event2013 Science and Information Conference, SAI 2013 - London, United Kingdom
Duration: 7 Oct 20139 Oct 2013

Publication series

NameProceedings of 2013 Science and Information Conference, SAI 2013

Conference

Conference2013 Science and Information Conference, SAI 2013
Country/TerritoryUnited Kingdom
CityLondon
Period7/10/139/10/13

Keywords

  • Home users
  • ISP
  • cyber awareness
  • cyber security
  • cyber threats
  • thick security-oriented
  • thin security-oriented

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'Home user security- from thick security-oriented home users to thin security- oriented home users'. Together they form a unique fingerprint.

Cite this