IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v14y2022i14p8319-d857679.html
   My bibliography  Save this article

An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation

Author

Listed:
  • Guangxu Wang

    (College of Business, City University of Hong Kong, Hong Kong 999077, China)

  • Daniel Tse

    (College of Business, City University of Hong Kong, Hong Kong 999077, China)

  • Yuanshuo Cui

    (College of Business, City University of Hong Kong, Hong Kong 999077, China)

  • Hantao Jiang

    (College of Business, City University of Hong Kong, Hong Kong 999077, China)

Abstract

It is undeniable that most business organizations rely on the Internet to conduct their highly competitive businesses nowadays. Cyber security is one of the important elements for companies to guarantee the normal operation of their business activities. However, there is no panacea in cyber security protection. Common security practices used are to deploy hardware and software security protection tools to combat the known security threats which may become more and more powerful later. In fact, the attackers and security practitioners are at war from time to time. As a result, such a tools-based security protection strategy cannot be sustained. On the other hand, the related awareness training for employees is ignored in a number of companies, which has made biased the decisions made by staff when facing cyber security breaches. In this study, in order to find ways to sustain such protection, we conduct a quantitative analysis to explore the key elements contributing to the SETA implementation of the companies and organizations. We evaluate the performances of eight supervised learning models in a dataset collected from cyber security breach surveys on UK businesses to perform a fundamental analysis. The detailed analysis is performed via the feature importance of features generated in the model with better performance in the task of detecting the companies and organizations with SETA implementation. The experiment result shows that the awareness related factors play the most significant role in the SETA implementation decision-making for the businesses, and most of the businesses are lacking the awareness to prevent the potential cyber security risks in the stuff using externally-hosted web services and products as well as services depending on online services.

Suggested Citation

  • Guangxu Wang & Daniel Tse & Yuanshuo Cui & Hantao Jiang, 2022. "An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation," Sustainability, MDPI, vol. 14(14), pages 1-13, July.
  • Handle: RePEc:gam:jsusta:v:14:y:2022:i:14:p:8319-:d:857679
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/14/14/8319/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/14/14/8319/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Labrecque, Lauren I. & Markos, Ereni & Swani, Kunal & Peña, Priscilla, 2021. "When data security goes wrong: Examining the impact of stress, social contract violation, and data type on consumer coping responses following a data breach," Journal of Business Research, Elsevier, vol. 135(C), pages 559-571.
    2. Hussain Aldawood & Geoffrey Skinner, 2019. "Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues," Future Internet, MDPI, vol. 11(3), pages 1-16, March.
    3. Ludwig Slusky & Parviz Partow-Navid, 2012. "Students Information Security Practices and Awareness," Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 8(4), pages 3-26, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Binglong Zheng & Daniel Tse & Jiajing Ma & Xuanyi Lang & Yinli Lu, 2023. "An Empirical Study of SETA Program Sustaining Educational Sector’s Information Security vs. Information Systems Misuse," Sustainability, MDPI, vol. 15(17), pages 1-17, August.
    2. Saqib Saeed, 2023. "Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia," Sustainability, MDPI, vol. 15(12), pages 1-15, June.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Somia Moh. T. L. Ashafee* & Nur Haryani Zakaria & Hatim Mohamad Tahir & Norliza Katuk & Mohd Nizam Omar, 2018. "Security Behaviors on Social Network Sites Used For Academic Purposes: A Comparison of Security Preparedness and Awareness among IT and Non-IT Postgraduate Students," The Journal of Social Sciences Research, Academic Research Publishing Group, pages 839-846:6.
    2. Slepchuk, Alec N. & Milne, George R. & Swani, Kunal, 2022. "Overcoming privacy concerns in consumers’ use of health information technologies: A justice framework," Journal of Business Research, Elsevier, vol. 141(C), pages 782-793.
    3. Saad Alahmari & Karen Renaud & Inah Omoronyia, 2023. "Moving beyond cyber security awareness and training to engendering security knowledge sharing," Information Systems and e-Business Management, Springer, vol. 21(1), pages 123-158, March.
    4. Cloarec, Julien, 2022. "Privacy controls as an information source to reduce data poisoning in artificial intelligence-powered personalization," Journal of Business Research, Elsevier, vol. 152(C), pages 144-153.
    5. Rong Liu & Jiawei Yang & Jifei Wu, 2022. "When Big Data Backfires: The Impact of a Perceived Privacy Breach by Pharmaceutical E-Retailers on Customer Boycott Intention in China," IJERPH, MDPI, vol. 19(8), pages 1-13, April.
    6. Saqib Saeed, 2023. "Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia," Sustainability, MDPI, vol. 15(12), pages 1-15, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:14:y:2022:i:14:p:8319-:d:857679. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.