{"id":324,"date":"2015-02-17T08:34:29","date_gmt":"2015-02-17T08:34:29","guid":{"rendered":"http:\/\/www.etfos.unios.hr\/ijeces-test\/?p=324"},"modified":"2017-03-23T08:04:48","modified_gmt":"2017-03-23T08:04:48","slug":"empirical-study-on-the-correlation-between-user-awareness-and-information-security","status":"publish","type":"post","link":"http:\/\/www.etfos.unios.hr\/ijeces\/vol-3-no-2-2012\/empirical-study-on-the-correlation-between-user-awareness-and-information-security\/","title":{"rendered":"Empirical Study on the Correlation between User Awareness and Information Security"},"content":{"rendered":"<div  class=\"fusion-fullwidth fullwidth-box hundred-percent-fullwidth\"  style='background-color: rgba(255,255,255,0);background-position: center center;background-repeat: no-repeat;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;'><div class=\"fusion-builder-row fusion-row \"><div  class=\"fusion-layout-column fusion_builder_column fusion_builder_column_1_1  fusion-one-full fusion-column-first fusion-column-last fusion-column-no-min-height 1_1\"  style='margin-top:0px;margin-bottom:0px;'>\n\t\t\t<div class=\"fusion-column-wrapper\" style=\"background-position:left top;background-repeat:no-repeat;-webkit-background-size:cover;-moz-background-size:cover;-o-background-size:cover;background-size:cover;\"  data-bg-url=\"\">\n\t\t\t\t<div class=\"fusion-title title fusion-title-size-three\" style=\"margin-top:0px;margin-bottom:31px;\"><h3 class=\"title-heading-left\">Kre\u0161imir \u0160oli\u0107, Kre\u0161imir Nenadi\u0107, Dario Gali\u0107<\/h3><div class=\"title-sep-container\"><div class=\"title-sep sep-single sep-solid\" style=\"border-color:#1e73be;\"><\/div><\/div><\/div><div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep sep-single sep-dashed\" style=\"border-color:#1e73be;border-top-width:1px;margin-left: auto;margin-right: auto;margin-top:;margin-bottom:10px;\"><\/div><div data-canvas-width=\"600.915\"><strong>Abstract<\/strong><\/div>\n<div data-canvas-width=\"600.915\">There are many existing high quality technical security solutions, but ongoing cyberwar is still not suppressed, which implies that there is a need for new concepts in information security. It is possible that the problem persists because the existing technical solutions have not included human factors. Those solutions are mostly focused on the attacker but should also be focused on the user as the integral part of the safeguarded system. It is possible that the user presents the weakest element in the security chain as the internal treats are among the most frequent information security issues. In this paper the authors analyse empirical data collected by simulation of e mail user behaviour caused by their level of security awareness. Results of this study confirm hypotheses that users can significantly influence the overall information system security level as well as private and business data used in e mail communication. The aim of this paper is to stress the problem of human influence on the information system security among technicians involved in developing technical security solutions, such as software engineers developing new algorithms for spam filters.<\/div>\n<div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep sep-single sep-dashed\" style=\"border-color:#1e73be;border-top-width:1px;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;\"><\/div><div data-canvas-width=\"70\"><strong>Keywords<\/strong><\/div>\n<div data-canvas-width=\"403.605\">information security, information system, security awareness, user behaviour<\/div>\n<div class=\"fusion-sep-clear\"><\/div><div class=\"fusion-separator fusion-full-width-sep sep-single sep-dashed\" style=\"border-color:#1e73be;border-top-width:1px;margin-left: auto;margin-right: auto;margin-top:10px;margin-bottom:10px;\"><\/div><p><a href=\"http:\/\/www.etfos.unios.hr\/ijeces\/wp-content\/uploads\/pappers\/ijeces_vol_3_no_2_01.pdf\" target=\"_blank\"><\/p>\n<div class=\"alignleft\"><i class=\"fa fontawesome-icon fa-file-text-o circle-yes\" style=\"border-color:#ffffff;background-color:#1e73be;font-size:15.84px;line-height:31.68px;height:31.68px;width:31.68px;margin-right:9px;color:#ffffff;\"><\/i><\/div><p><\/a><\/p>\n<div class=\"fusion-clearfix\"><\/div>\n\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[41],"tags":[],"_links":{"self":[{"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/posts\/324"}],"collection":[{"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/comments?post=324"}],"version-history":[{"count":4,"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/posts\/324\/revisions"}],"predecessor-version":[{"id":1147,"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/posts\/324\/revisions\/1147"}],"wp:attachment":[{"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/media?parent=324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/categories?post=324"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.etfos.unios.hr\/ijeces\/wp-json\/wp\/v2\/tags?post=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}