Determination of Cyber Security Awareness of Public Employees and Consciousness-rising Suggestions

Huseyin Kuru, Mehmet Akif Ocak


View Counter: Abstract - 282 times| PDF - 300 times| HTML - 878 times|

Abstract


The aim of this study is to measure Turkish government employees’ awareness of cyber security and cyber space elements. Participants were 71 Turkish public employees working for various ministries. Both qualitative and quantitative research methods were used to get the most detailed information from the participants. A survey was administered to cyber security officers in chosen state institutions. For qualitative research, open-ended questions were administered to the participants. Reliability and validity issues were established for both surveys. Results show that employees have enough information about cyber security and cyber warfare. Findings clearly suggests that cyber defense policy should be planned in coordination with other state institutions and experiences should be shared. In order to create feasible and realistic cyber security policy at institutional level, experts at cyber security must be trained, hired and help must be requested from specialized individuals and institutions. This study recommends that rapid reaction teams (RRT) should be established to take care of cyber systems, to react against cyber breaches in time, to alert staff for cyber-attacks in order to establish effective recovery.

RECEIVED 17 May 2016, REVISED 11 June 2016, ACCEPTED 11 June 2016

 


Keywords


cyber security, cyber warfare, hacker, hacktivism, critical infrastructure

Full Text:

PDF HTML

References


Akgun, B. (2011). Wikileaks and Assangists. Strategic Thinking Journal, 2(14), 22.

Amoroso, E.G., (2012). Cyber-attacks: protecting national infrastructure. UK: Butterworth-Heinemann, 13-17.

Collin, B. C. (1997). The future of cyberterrorism: Where the physical and virtual worlds converge. Crime and Justice International, 13(2), 14-18.

Command, D. (2005). Cyber Operations and Cyber Terrorism. DCSINT Handbook No. 1.02.

Demirkiran, P., (2013), Anonymous ve Hacktivizm, A.R. Keleş, F. Sayılan. (Editors) Hacker Culture and Hacktivizm. İstanbul: Alternative Informatics Association Headquarters, 288-291.

Infoworld, (2013). Cyber-espionage moves into B2B, Retrieved from

http://www.webcitation.org/query?url=http%3A%2F%2Fwww.infoworld.com%2Farticle%2F2642608%2Ftechology-business%2Fcyber-espionage-moves-into-b2b.html&date=2016-02-13. 13.02.2016.

Lewis, J. A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic and International Studies, 8-9.

Ogun, M. N., & Kaya, A. (2012) Significance of Cyber Security for National Security: A Study Concerning the Necessary Measures. Security

Strategies Journal, 9(18), 145-180

SOME (2013). 2013-2014 Action Plan, 2016-02-13 Retrieved from

http://www.webcitation.org/query?url=http%3A%2F%2Fwww.udhb.gov.tr%2Fdoc%2Fsiberg%2FSOME_2013-2014_EylemPlani.pdf&date=2016-02-13. 13.02.2016.

TUIK (2014). Turkey Statistical Institute Household Information Technology Usage Survey, Retrieved from

http://www.webcitation.org/query?url=http%3A%2F%2Fwww.tuik.gov.tr%2FPreHaberBultenleri.do%3Fid%3D16198&date=2016-02-12. 12.02.2016.

Vural, Y., & Sagıroglu, S. (2013). Cyber Security Risk Analysis, Threat and Readiness Levels. presented at Conference of International Participation Information Security and Cryptology, September 20-21th, Ankara.

Yayla, M., (2014). Cyber War and its difference from malicious acts in the Cyber environment. Hacettepe Law School Journal, 4(2), 181-197.

Yasar, H. (2014). Corporate Cyber Threats and Prevention Methods and a Case for Enterprise Security Cyber Security Action Plan. Master’s Thesis, Gazi University, Computer Forensics Institute, Ankara.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

...........................................................................................................................................

Journal of Learning and Teaching in Digital Age. All rights reserved, 2016. ISSN:2458-8350