Search results

1 – 3 of 3
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 13 June 2016

Kirsi Helkala, Benjamin Knox, Øyvind Jøsok, Silje Knox and Mass Lund

The purpose of this study is to investigate how motivation – gained by understanding the purpose of specific cyber-oriented tasks – coping strategies and level of physical…

459

Abstract

Purpose

The purpose of this study is to investigate how motivation – gained by understanding the purpose of specific cyber-oriented tasks – coping strategies and level of physical conditioning can affect cognitive abilities amongst cyber officer cadets.

Design/methodology/approach

Two cognitive tests (2014 and 2015) and coping strategy questionnaires (2015) were conducted during an annual military exercise involving increased levels of stress and hardship (physical and cognitive) over a sustained two-week period.

Findings

Motivation – gained by task explanations – and the conscious use of the “control” strategy can have a positive effect on individual performance in cyber tasks.

Research limitations/implications

The participants were all young adults with higher-than-average levels of physical fitness. From the outset, all participants were highly motivated and disciplined having entered cyber officer training after successfully completing a thorough selection process.

Practical implications

The results of this study are to be better implemented to the activities at the military academy.

Social implications

The closest civilian occupational equivalent is a computer network operations (CNO)-operator. The findings could be implemented into their daily work routines.

Originality/value

Cognitive tests used in this study are based on recognized general cognitive tests. However, modifications were made to suit the cyber task context, making the test original. The cyber officer is a contemporary concept currently lacking research.

Details

Information & Computer Security, vol. 24 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Access Restricted. View access options
Article
Publication date: 7 October 2014

Kirsi Helkala and Tone Hoddø Bakås

The purpose of this paper is to extend the results of a Norwegian password security survey. Research, especially in the early 21st century, has shown that education is needed to…

1043

Abstract

Purpose

The purpose of this paper is to extend the results of a Norwegian password security survey. Research, especially in the early 21st century, has shown that education is needed to change people’s behaviour regarding password generation, management and storage. As our daily routines and duties have become more dependent on electronic services in the last decade, one could think that qualitative education is nowadays given to users. This survey is to verify that assumption.

Methodology

A nation-wide demographic survey among employees in Norway with a sample of 1,003 respondents at the ages of 18-64 years was conducted in October 2012.

Findings

The results show that the education or proper guidance seldom is given leading to the outdated users’ behaviour.

Research limitations

The results of the study are limited to the employed only and they do not explain behaviour of students, teenagers or children.

Social implications

During the current year, the results of the study have been discussed several times in national media and, hopefully, have an impact to employees’ behaviour. The results have also been used in the National Security Month campaign in October 2013.

Originality/value

The questionnaire itself is not unique. However, the large amount of respondents gives higher value to the results.

Details

Information Management & Computer Security, vol. 22 no. 4
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 20 March 2009

Kirsi Helkala and Einar Snekkenes

The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific…

762

Abstract

Purpose

The purpose of this paper is to present a new method for ranking authentication products. Using this method, issues such as technical performance, application/system‐specific requirements, cost and usability are addressed. The method simplifies and makes the selection process more transparent by identifying issues that are important when selecting products.

Design/methodology/approach

The paper used quantitative cost and performance analysis.

Findings

The method can be widely applied, allowing the comparison and ranking of an extensive variety of authentication products (passwords, biometrics, tokens). The method can be used for both product selection and the process of product development as supported by the case studies.

Originality/value

This is a work that demonstrates how to compare authentication methods from different categories. A novel ranking method has been developed which allows the comparison of different authentication products in a defined usage scenario.

Details

Information Management & Computer Security, vol. 17 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 3 of 3
Per page
102050