EN
Determination of Cyber Security Awareness of Public Employees and Consciousness-rising Suggestions
Abstract
The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams RRT should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.RECEIVED 17 May 2016, REVISED 11 June 2016, ACCEPTED 11 June 2016
Keywords
References
- Akgun, B. (2011). Wikileaks and Assangists. Strategic Thinking Journal, 2(14), 22.
- Amoroso, E.G., (2012). Cyber-attacks: protecting national infrastructure. UK: Butterworth-Heinemann, 13-17.
- Collin, B. C. (1997). The future of cyberterrorism: Where the physical and virtual worlds converge. Crime and Justice International, 13(2), 14-18.
- Command, D. (2005). Cyber Operations and Cyber Terrorism. DCSINT Handbook No. 1.02.
- Demirkiran, P., (2013), Anonymous ve Hacktivizm, A.R. Keleş, F. Sayılan. (Editors) Hacker Culture and Hacktivizm. İstanbul: Alternative Informatics Association Headquarters, 288-291.
- Infoworld, (2013). Cyber-espionage moves into B2B, Retrieved from
- http://www.webcitation.org/query?url=http%3A%2F%2Fwww.infoworld.com%2Farticle%2F2642608%2Ftechology-business%2Fcyber-espionage-moves-into-b2b.html&date=2016-02-13. 13.02.2016.
- Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic and International Studies, 8-9.
Details
Primary Language
English
Subjects
-
Journal Section
-
Publication Date
June 1, 2016
Submission Date
-
Acceptance Date
-
Published in Issue
Year 1970 Volume: 1 Number: 2