Nurse, Jason R. C., Dobrontei, Suzie, Webster, Jonathan, Alashe, Oz (2026) Toward a behavioral ontology for cybersecurity: Introducing SebDB. In: 8th International Conference on HCI for Cybersecurity, Privacy and Trust, colocated with the 28th International Conference on Human-Computer Interaction, 26 - 31 July 2026, Montreal, Canada. (In press) (Access to this publication is currently restricted. You may be able to access a copy if URLs are provided) (KAR id:113131)
|
PDF
Author's Accepted Manuscript
Language: English Restricted to Repository staff only |
|
|
Contact us about this publication
|
|
Abstract
Cyberattacks that target individuals remain a significant threat to an organization’s security, placing human behavior at the center of effective defense. This paper focuses on this topic and makes two novel contributions to the field. First, we introduce the Security Behaviors Database (SebDB), an open-source resource that documents security behaviors, links them to organizational risks, and maps them to established security standards. SebDB currently includes more than 100 core behaviors, associated impacts when behaviors are not followed, and alignments with widely used frameworks, including the NIST Cybersecurity Framework (CSF) and MITRE ATT\&CK. Developed by a consortium of practitioners and researchers, SebDB is intended to improve the understanding, modeling, and measurement of human cyber risk and to support behavior-change initiatives that can measurably improve security posture. In this article, we describe the motivation, design, and structure of SebDB, including behaviors and their risk and control mappings. The second novel contribution of this research is the proposal of a behavioral ontology for cybersecurity. This ontology, which realizes the overarching vision for SebDB, presents one of the first comprehensive conceptualizations of knowledge in the behavioral security and human aspects of the cybersecurity domains. Through this ontology, we model how behaviors can be linked to risks, threat actor tactics, vulnerabilities, and security controls, while also covering how behavioral interventions can be leveraged as part of an organization’s security strategy.
| Item Type: | Conference or workshop item (Paper) |
|---|---|
| Uncontrolled keywords: | security behaviors, behavior change, human cyber risk, awareness and training, database, behavioral ontology, knowledge base, human risk management, behavioral security, psychology |
| Subjects: |
B Philosophy. Psychology. Religion > BF Psychology H Social Sciences > H Social Sciences (General) Q Science > QA Mathematics (inc Computing science) T Technology > T Technology (General) |
| Institutional Unit: |
Schools > School of Computing Institutes > Institute of Cyber Security for Society |
| Former Institutional Unit: |
There are no former institutional units.
|
| Depositing User: | Jason Nurse |
| Date Deposited: | 17 Feb 2026 09:01 UTC |
| Last Modified: | 17 Feb 2026 09:02 UTC |
| Resource URI: | https://kar.kent.ac.uk/id/eprint/113131 (The current URI for this page, for reference purposes) |
- Export to:
- RefWorks
- EPrints3 XML
- BibTeX
- CSV
- Depositors only (login required):

https://orcid.org/0000-0003-4118-1680
Total Views
Total Views