Research Article
BibTex RIS Cite

SİBER UZAYDA YETERİNCE GÜVENLİ DAVRANIYOR MUYUZ? İSTANBUL İLİNDE YÜRÜTÜLEN NİCEL BİR ARAŞTIRMA

Year 2018, Volume: 16 Issue: 2, 191 - 216, 30.06.2018

Abstract

Siber uzay
ortamı; bankacılık, sulama, enerji üretimi, ulaşım finans, sağlık, haberleşme, ulusal
savunma sistemleri gibi farklı alanlarda oluşturulan ve yayılan bilgi
yığınlarından oluşmaktadır. Böylesine etkili bir ortamda yer alan bilgiyi her
tür etkiden koruyabilmek ve sürdürülebilirliğini sağlamak önemli bir problem
olarak karşımıza çıkmaktadır. Bu problemin çözümü ise “Siber Güvenlik”ten
geçmektedir. Bu çalışma ile bireylerin, siber uzay ortamında
gerçekleştirdikleri faaliyetler esnasında siber güvenlikle ilgili davranışları
ölçülmüştür. Araştırmada kolayda örnekleme yöntemi kullanılmış, İstanbul’da
yaşayan 18 yaş ve üzeri 335 bireyden internet ortamında anket yoluyla veriler
toplanmıştır. Siber güvenlik davranışının demografik faktörlere göre
farklılaşıp farklılaşmadığı T-Test ve ANOVA ile analiz edilmiştir. Kadınların
yazılım güncelleme sıklığının erkeklerden yüksek olduğu, özel sektör
çalışanlarında cihaz güvenliği davranışı sıklığının kamu çalışanlarından yüksek
olduğu, internette geçirilen süre arttıkça pro-aktif farkındalık sıklığının
arttığı görülmüştür. Sonraki çalışmalarda bireylerin siber güvenlik davranışına
neden olan ve bu davranışa engel olan faktörlerin araştırılması önerilmektedir.

References

  • Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312. Bada, M., & Sasse, A. (2014). Cyber Security Awareness Campaigns: Why do they fail to change behaviour? Global Cyber Security Capacity Centre: Draft Working Paper. Beautement, A., Sasse, M. A., & Wonham, M. (2009, August). The compliance budget: managing security behaviour in organisations. In Proceedings of the 2008 workshop on New security paradigms (pp. 47-58). ACM. Beyer, M., Ahmed, S., Doerlemann, K., Arnell, S., Parkin, S., Sasse, M. A., & Passingham, N. (2015). Awareness is only the first step. A framework for progressive engagement of staff in cyber security, Hewlett Packard, Business white paper. Blythe, J. (2013). Cyber security in the workplace: Understanding and promoting behaviour change. Proceedings of CHItaly 2013 Doctoral Consortium, 1065, 92-101. Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. computers & security, 26(1), 63-72. Coventry, L., Briggs, P., Blythe, J., & Tran, M. (2014). Using behavioural insights to improve the public’s use of cyber security best practices. gov. uk report. CTR Uluslararası Belgelendirme ve Denetim Ltd. Şti. Web Sitesi, http://belgelendirme.ctr.com.tr/iso-27001.html (02.03.2018) Davinson, N., & Sillence, E. (2010). It won't happen to me: Promoting secure behaviour among Internet users. Computers in Human Behavior, 26(6), 1739-1747. Department of Defense Dictionary of Military and Associated Terms, https://fas.org/irp/doddir/dod/jp1_02.pdf pg.44 (18.01.2018) Egelman, S., Harbach, M., & Peer, E. (2016, May). Behavior ever follows intention?: A validation of the security behavior intentions scale (SeBIS). In Proceedings of the 2016 CHI conference on human factors in computing systems (pp. 5257-5261). ACM. Egelman, S., & Peer, E. (2015, April). Scaling the security wall: Developing a security behavior intentions scale (sebis). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2873-2882). ACM. Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies–A case study. information security technical report, 14(4), 223-229. Erol, O., Şahin, Y. L., Yılmaz, E., & Haseski, H. İ. (2015). Kişisel Siber Güvenliği Sağlama Ölçeği geliştirme çalışması. Journal of Human Sciences, 12(2), 75-91. Güldüren, C., Çetinkaya, L., & Keser, H. (2016). Ortaöğretim öğrencilerine yönelik bilgi güvenliği farkındalık ölçeği (BGFÖ) geliştirme çalışması. İlköğretim Online, 15(2). Harrington, S., Anderson, C., & Agarwal, R. (2006). Practicing safe computing: Message framing, self-view, and home computer user security behavior intentions. ICIS 2006 Proceedings, 93. Internetworldstats, http://www.internetworldstats.com/stats.htm (17.01.2018) ITU (International Telecommunication Union https://www.itu.int/en/ITU-D/Cybersecurity/Documents/Introduction%20to%20the%20Concept%20of%20IT%20Security.pdf pg.18, pg.43 (17.01.2018) ITU-T Rec., ITU-T Rec. X.1205 (04/2008) Overview of cybersecurity, https://www.itu.int/rec/T-REC-X.1205-200804-I (22.01.2018) Johnson, M. E., & Goetz, E. (2007). Embedding information security into the organization. IEEE Security & Privacy, 5(3). Karacı, A., Akyüz, H. İ., & Bilgici, G. (2017). Üniversite Öğrencilerinin Siber Güvenlik Davranışlarının İncelenmesi. Kastamonu Eğitim Dergisi, 25(6), 2079-2094. Li, L., Xu, L., He, W., Chen, Y., & Chen, H. (2016, December). Cyber Security Awareness and Its Impact on Employee’s Behavior. In International Conference on Research and Practical Issues of Enterprise Information Systems (pp. 103-111). Springer, Cham. Li, Y., & Siponen, M. T. (2011, July). A Call For Research On Home Users' Information Security Behaviour. In PACIS (p. 112). Mariea Grubbs Hoy & George Milne (2010) Gender Differences in PrivacyRelated Measures for Young Adult Facebook Users, Journal of Interactive Advertising, 10:2, 28-45, DOI: 10.1080/15252019.2010.10722168. Ng, B. Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825. Resmi Gazete, http://www.udhb.gov.tr/doc/siberg/SOME_2013-2014_EylemPlani.pdf (17.01.2018) Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. Cacioppo, & R. Petty (Eds.), Social psychophysiology. New York: Guilford Press. Rosenstock, I. M. (1974). The health belief model and preventive health behavior. Health Education Monographs 2. Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78. Security 101, https://www.cmu.edu/iso/aware/presentation/security101-v2.pdf [22.01.2018] Shih, D. H., Lin, B., Chiang, H. S., & Shih, M. H. (2008). Security aspects of mobile phone virus: a critical survey. Industrial Management & Data Systems, 108(4), 478-494. The United States Army’s Cyberspace Operations Concept Capability Plan 2016-2028 http://www.fas.org/irp/doddir/army/pam525-7-8.pdf (17.01.2018) TÜİK, http://www.tuik.gov.tr/PreTablo.do?alt_id=1028 (14.02.2018) Türk Dil Kurumu Büyük Türkçe Sözlüğü, http://www.tdk.gov.tr/index.php?option=com_bts&arama=kelime&guid=TDK.GTS.5a5f59db572c44.38695410 (17.01.2018) Ulusal Siber Savunma 2017, http://hgm.ubak.gov.tr/tr/haber/86 (14.02.2018). Ünver, M. Ulusal Siber Güvenliğin Sağlanmasında Farkındalık Çalışmaları, http://www.bilgiguvenligi.org.tr/s/2246/i/Mustafa_Unver-Ulusal_Siber_G%C3%BCvenligin_Saglanmasinda_Farkindalik_Calismalari.pdf (13.10.2015). Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Year 2018, Volume: 16 Issue: 2, 191 - 216, 30.06.2018

Abstract

References

  • Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237-248. Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees' cybersecurity behaviors. Computers in Human Behavior, 69, 437-443. Arachchilage, N. A. G., & Love, S. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304-312. Bada, M., & Sasse, A. (2014). Cyber Security Awareness Campaigns: Why do they fail to change behaviour? Global Cyber Security Capacity Centre: Draft Working Paper. Beautement, A., Sasse, M. A., & Wonham, M. (2009, August). The compliance budget: managing security behaviour in organisations. In Proceedings of the 2008 workshop on New security paradigms (pp. 47-58). ACM. Beyer, M., Ahmed, S., Doerlemann, K., Arnell, S., Parkin, S., Sasse, M. A., & Passingham, N. (2015). Awareness is only the first step. A framework for progressive engagement of staff in cyber security, Hewlett Packard, Business white paper. Blythe, J. (2013). Cyber security in the workplace: Understanding and promoting behaviour change. Proceedings of CHItaly 2013 Doctoral Consortium, 1065, 92-101. Cone, B. D., Irvine, C. E., Thompson, M. F., & Nguyen, T. D. (2007). A video game for cyber security training and awareness. computers & security, 26(1), 63-72. Coventry, L., Briggs, P., Blythe, J., & Tran, M. (2014). Using behavioural insights to improve the public’s use of cyber security best practices. gov. uk report. CTR Uluslararası Belgelendirme ve Denetim Ltd. Şti. Web Sitesi, http://belgelendirme.ctr.com.tr/iso-27001.html (02.03.2018) Davinson, N., & Sillence, E. (2010). It won't happen to me: Promoting secure behaviour among Internet users. Computers in Human Behavior, 26(6), 1739-1747. Department of Defense Dictionary of Military and Associated Terms, https://fas.org/irp/doddir/dod/jp1_02.pdf pg.44 (18.01.2018) Egelman, S., Harbach, M., & Peer, E. (2016, May). Behavior ever follows intention?: A validation of the security behavior intentions scale (SeBIS). In Proceedings of the 2016 CHI conference on human factors in computing systems (pp. 5257-5261). ACM. Egelman, S., & Peer, E. (2015, April). Scaling the security wall: Developing a security behavior intentions scale (sebis). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 2873-2882). ACM. Eminağaoğlu, M., Uçar, E., & Eren, Ş. (2009). The positive outcomes of information security awareness training in companies–A case study. information security technical report, 14(4), 223-229. Erol, O., Şahin, Y. L., Yılmaz, E., & Haseski, H. İ. (2015). Kişisel Siber Güvenliği Sağlama Ölçeği geliştirme çalışması. Journal of Human Sciences, 12(2), 75-91. Güldüren, C., Çetinkaya, L., & Keser, H. (2016). Ortaöğretim öğrencilerine yönelik bilgi güvenliği farkındalık ölçeği (BGFÖ) geliştirme çalışması. İlköğretim Online, 15(2). Harrington, S., Anderson, C., & Agarwal, R. (2006). Practicing safe computing: Message framing, self-view, and home computer user security behavior intentions. ICIS 2006 Proceedings, 93. Internetworldstats, http://www.internetworldstats.com/stats.htm (17.01.2018) ITU (International Telecommunication Union https://www.itu.int/en/ITU-D/Cybersecurity/Documents/Introduction%20to%20the%20Concept%20of%20IT%20Security.pdf pg.18, pg.43 (17.01.2018) ITU-T Rec., ITU-T Rec. X.1205 (04/2008) Overview of cybersecurity, https://www.itu.int/rec/T-REC-X.1205-200804-I (22.01.2018) Johnson, M. E., & Goetz, E. (2007). Embedding information security into the organization. IEEE Security & Privacy, 5(3). Karacı, A., Akyüz, H. İ., & Bilgici, G. (2017). Üniversite Öğrencilerinin Siber Güvenlik Davranışlarının İncelenmesi. Kastamonu Eğitim Dergisi, 25(6), 2079-2094. Li, L., Xu, L., He, W., Chen, Y., & Chen, H. (2016, December). Cyber Security Awareness and Its Impact on Employee’s Behavior. In International Conference on Research and Practical Issues of Enterprise Information Systems (pp. 103-111). Springer, Cham. Li, Y., & Siponen, M. T. (2011, July). A Call For Research On Home Users' Information Security Behaviour. In PACIS (p. 112). Mariea Grubbs Hoy & George Milne (2010) Gender Differences in PrivacyRelated Measures for Young Adult Facebook Users, Journal of Interactive Advertising, 10:2, 28-45, DOI: 10.1080/15252019.2010.10722168. Ng, B. Y., Kankanhalli, A., & Xu, Y. C. (2009). Studying users' computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815-825. Resmi Gazete, http://www.udhb.gov.tr/doc/siberg/SOME_2013-2014_EylemPlani.pdf (17.01.2018) Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. Cacioppo, & R. Petty (Eds.), Social psychophysiology. New York: Guilford Press. Rosenstock, I. M. (1974). The health belief model and preventive health behavior. Health Education Monographs 2. Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78. Security 101, https://www.cmu.edu/iso/aware/presentation/security101-v2.pdf [22.01.2018] Shih, D. H., Lin, B., Chiang, H. S., & Shih, M. H. (2008). Security aspects of mobile phone virus: a critical survey. Industrial Management & Data Systems, 108(4), 478-494. The United States Army’s Cyberspace Operations Concept Capability Plan 2016-2028 http://www.fas.org/irp/doddir/army/pam525-7-8.pdf (17.01.2018) TÜİK, http://www.tuik.gov.tr/PreTablo.do?alt_id=1028 (14.02.2018) Türk Dil Kurumu Büyük Türkçe Sözlüğü, http://www.tdk.gov.tr/index.php?option=com_bts&arama=kelime&guid=TDK.GTS.5a5f59db572c44.38695410 (17.01.2018) Ulusal Siber Savunma 2017, http://hgm.ubak.gov.tr/tr/haber/86 (14.02.2018). Ünver, M. Ulusal Siber Güvenliğin Sağlanmasında Farkındalık Çalışmaları, http://www.bilgiguvenligi.org.tr/s/2246/i/Mustafa_Unver-Ulusal_Siber_G%C3%BCvenligin_Saglanmasinda_Farkindalik_Calismalari.pdf (13.10.2015). Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
There are 1 citations in total.

Details

Primary Language Turkish
Journal Section İktisadi ve idari Bilimler Sayısı
Authors

A.Naci Ünal

Ahu Ergen

Publication Date June 30, 2018
Published in Issue Year 2018 Volume: 16 Issue: 2

Cite

APA Ünal, A., & Ergen, A. (2018). SİBER UZAYDA YETERİNCE GÜVENLİ DAVRANIYOR MUYUZ? İSTANBUL İLİNDE YÜRÜTÜLEN NİCEL BİR ARAŞTIRMA. Manisa Celal Bayar Üniversitesi Sosyal Bilimler Dergisi, 16(2), 191-216. https://doi.org/10.18026/cbayarsos.439489