Spotlight
Media
Documents:
Audio/Podcasts:
Biography
Professor Benson is a Director of the Cyber Security Innovation Research Centre. She has published over 100 journal papers, books, edited volumes and other publications. Vladlena's research encompasses areas of innovation actions across cybersecurity risk management, financial and VFA technologies. Her research at Aston has been supported by grants from the European Commission, GCRF, Ministry of Science and Technology (Taiwan), UKRI Strategic Priorities and the British Council. She is a member of the national Digital Policy Alliance Security Skills and Partnerships group (with Lord Lucas the Political chair), Vladlena is now working with multiple organisations and government moulding future national policy within Cyber Security, Skills and Partnerships. Alongside her academic role, she is a member of the UK Cyber Security Council (UK CSC) WS6 representing Information Systems Audit and Control Association (ISACA) where she is Board Member. Prof. Benson serves on the European Union Agency for Cybersecurity (ENISA) defining the criteria for European Cybersecurity Framework at the EU level.
Areas of Expertise (3)
Emergent Technologies
Cybersecurity and Risk Management
Digital Transformation
Accomplishments (1)
Women in IT Awards Editor's Choice (professional)
2017
Education (1)
University of Texas at Dallas: PhD, Computer Science 2001
Links (5)
Media Appearances (3)
Coronavirus and cybercrime: Germany assumes EU presidency with strong focus on cybersecurity
The Daily Swig online
2020-07-24
“The EU has had a reactive focus on cybersecurity, but the crisis – and working from home – has made innovation necessary, and it is moving higher up the priority list,” says Vladlena Benson, professor of Cybersecurity Management at Aston University and board member of the ISACA UK Central Chapter.
Social Media Genie Won't Go Back In The Bottle, So We Must Teach Youngsters To Use It Wisely
Independent online
2017-07-23
Teenagers in Britain are fortunate to have access to computers, laptops and smartphones from an early age. A child in the UK receives a smartphone at around the age of 12 – among the earliest in Europe. The natural consequence of this is that children spend a significant amount of their time on the internet.
Study shows current university students are safer and more responsible social media users
Phys.org online
2015-11-09
Vladlena Benson, associate professor in accounting, finance and informatics at the Kingston Business School, who led the research, said that the study's findings challenged current thinking about social media. "Students' use of social media has now matured - and this group is keen to access networking services to support their learning experiences," she said. "Higher education providers must not miss the opportunity to exploit the tech-savviness of learners because of a mistaken belief that the online environment is too risky or that students won't be interested in using social media for learning."
Articles (5)
Understanding the Relationship Between Cybercrime and Human Behavior Through Criminological Theories and Social Networking Sites
Encyclopedia of Criminal Activities and the Deep WebAnne-Marie Mohammed, Vladlena Benson, George Saridakis
2020-01-01
This article seeks to gain a better understanding of how to address some of the challenges in the digital world. In order to do this, the authors presented some of the emerging issues in the psychology of human behavior and the ever changing nature of cyber threats in the digital world. They reviewed both the theories of crime (i.e., self-control and rational choice theories) and the empirical studies that have examined user behavior on social networking sites leading to victimization. Importantly, they mentioned the role of social engineering as the entry point of many of these sophisticated attacks. They went on to examine the relevance of the human element as the starting point of implementing cyber security programs in organizations as well as securing individual online behavior. Furthermore, issues that are associated with the emerging trends in human behavior research as well as ethics were also discussed. They acknowledge that much more academic attention is needed in this area to avoid the exponential growth of future information breaches.
Information and communication technologies: a curse or blessing for SMEs?
Emerging Cyber Threats and Cognitive VulnerabilitiesAnne-Marie Mohammed, Bochra Idris, George Saridakis, Vladlena Benson
2020-01-01
This chapter discusses the risk and compliance challenges arising from the growing use of information and communication technologies by firms, in particular small- and medium-sized enterprises. It argues that firms utilize technological advancements to make business transactions quicker and more efficient and enable globalization by relying on the Internet as a strategic tool. It further demonstrates that by so doing, it in turn allows for cyber security threats, which may lead to financial losses and damaged reputations.
Risk and social influence in sustainable smart home technologies: A persuasive systems design model
Cyber Influence and Cognitive ThreatsNataliya Shevchuk, Harri Oinas-Kukkonen, Vladlena Benson
2020-01-01
Because of the emerging spread of smart home technologies, reaching and influencing people's behaviour is easier than ever before. Introduction of innovative information systems (IS), present in everyday life, should not ignore the users' security concerns for privacy. We believe that this notion also applies to Green IS that trigger sustainable behaviour change. To understand better the users' perceptions of sustainable persuasive smart home technologies, we inspect a case of a persuasive smart metering system. Specifically, we look at how persuasive systems design influences intention to continue using a smart metering system as well as how risk and self-disclosure affect the impact of the persuasive systems design on a smart metering system. We developed a research model and formed hypotheses by drawing on Persuasive Systems Design model and Adaption Level Theory. We used a smart metering system enhanced with the persuasive features as an illustration of a sustainable persuasive smart home technology. Results of our study provide insights relevant for the further research of security issues in sustainable persuasive smart home technologies as well as for practitioners who introduce similar technologies to the users.
Social big data and its integrity: The effect of trust and personality traits on organic reach of facebook content
Cyber Influence and Cognitive ThreatsVladlena Benson, Tom Buchanan
2020-01-01
In the wake of fresh allegations that personality data from Facebook users have been illegally used to influence the outcome of the US general election and the Brexit vote, the debate over manipulation of social big data is gaining further momentum. This chapter addresses the social data privacy and data integrity vulnerabilities threatening the future of applications based on anticipatory computing paradigms. We investigate the organic reach phenomenon on social networks known to be responsible for propagation of ‘fake’ social content, undermining social media data integrity. We describe experimental work demonstrating that the trustworthiness of a message originator and low levels of the personality trait Agreeableness in the message receiver may increase the organic reach of ‘fake’ content on social networks. These effects may have implications for policy and practise, particularly in relevance to the threat of social data manipulation for anticipatory computing applications.
Cybersecurity as a social phenomenon
Cyber Influence and Cognitive ThreatsJohn McAlaney, Vladlena Benson
2020-01-01
Humans are social creatures. Our behaviour is influenced by our perceptions of those around us, often to a much greater degree than we realize. However, we tend to make mistakes in our understanding of those around us and the situations that we encounter. We do so because our cognitive resources have limits, meaning that we have developed systems of coming to quick conclusions based on limited information. These processes are known as heuristics. This is not a flaw; rather it is an adaptive strategy that allows us to navigate and survive in our social worlds. Nevertheless, these tendencies may lead people to engage in cybersecurity in risky ways, either as the instigators of attacks, the targets of attacks, or the cybersecurity professionals who seek to prevent and mitigate attacks. Examples of this include group dynamics in which individuals overestimate the abilities of their own group whilst underestimating the abilities of competing groups, or failing to recognize the threat of cybersecurity risks that are difficult to visualize. In ways like those used with marketing and advertising campaigns, social engineers aim to exploit these quirks of social influence and human decision making. A greater understanding of these processes will enable us to develop more informed prevention and mitigation strategies in order to address the increasing challenges we face within cybersecurity.
Social