Malmö University Publications
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Information Security Culture Guidelines: Based on Best Practices
Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
2025 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

As the global cyber threat continues to increase, best practices to form an information security culture are needed. The majority of personal data breaches and cyber incidents result from human error and a lack of awareness. In 2025, this is common knowledge. However, there are still few practical strategies and guides on identifying and implementing security best practices fitted to an organization's specific needs. The main goal of this study is to aid organizations in improving their information security culture. To address this, the study uses a systematic literature review and qualitative semi-structured interviews with experienced professionals in the cybersecurity field. To analyze the gathered data, a manual thematic analysis was performed to give insight into the patterns and themes. While the information security culture topic can seem abstract, there are some concrete solutions to it. Data shows that an open, forgiving, and non-bureaucratic communication combined with personality adaptation and training are fundamental key pillars in shaping a robust information security culture. 

The results suggest that by assessing departments, encouraging direct communication, and allowing informal as well as formal discussions around security, organizations can better identify and implement their needs.

Place, publisher, year, edition, pages
2025. , p. 39
Keywords [en]
Information security, culture, cybersecurity, open-door policy, qualitative method, security best practices
National Category
Information Systems, Social aspects
Identifiers
URN: urn:nbn:se:mau:diva-76506OAI: oai:DiVA.org:mau-76506DiVA, id: diva2:1965097
External cooperation
Verisure
Educational program
TS Systemutvecklare
Supervisors
Examiners
Available from: 2025-06-10 Created: 2025-06-07 Last updated: 2025-06-10Bibliographically approved

Open Access in DiVA

fulltext(624 kB)9 downloads
File information
File name FULLTEXT02.pdfFile size 624 kBChecksum SHA-512
0668d0d5a648445e3902b35fc06630150241489b79540f8dbea34a65d02cd3c6cb6e0bae5deccec84ab7fc7868b803c708008a059ad857323710a4e45c7a4aa5
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Huss, Olle
By organisation
Department of Computer Science and Media Technology (DVMT)
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar
Total: 9 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 54 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf