Social Psychology: An under-used tool in Cybersecurity

نویسندگان

  • Helen Thackray
  • John McAlaney
  • Huseyin Dogan
  • Jacqui Taylor
  • Christopher Richardson
چکیده

In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties and greater understanding of the risks and consequences for cyber attackers and defenders alike.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The social psychology of cybersecurity

Online interactions are often based on trust, the sharing of information and a degree of interdependence, as found with many offline relationships. The recent events at companies such as TalkTalk and Ashley Madison are the latest in a series of high profile cybersecurity incidents that demonstrate what happens when this trust relationship is breached. Despite the common media depiction, inciden...

متن کامل

A Review of Value-Conflicts in Cybersecurity An assessment based on quantitative and qualitative literature analysis

Cybersecurity is of capital importance in a world where economic and social processes increasingly rely on digital technology. Although the primary ethical motivation of cybersecurity is prevention of informational or physical harm, its enforcement can also entail conflicts with other moral values. This contribution provides an outline of value conflicts in cybersecurity based on a quantitative...

متن کامل

Towards a Human Factors Ontology for Cyber Security

Traditional cybersecurity risk assessment is reactive and based on business risk assessment approach. The 2014 NIST Cybersecurity Framework provides businesses with an organizational tool to catalog cybersecurity efforts and areas that need additional support. As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human fact...

متن کامل

Twitter Sentiment Analysis: An Examination of Cybersecurity Attitudes and Behavior

This exploratory study examines the cybersecurity attitudes and actual behavior over time using the data collected on the social media microblogging platform, Twitter. We plan to use the sentiment analysis and text mining techniques on original tweets related to cybersecurity collected at two different time periods. Upon completion of this research, we would present the analysis of the relation...

متن کامل

Social Cybersecurity

............................................................................................................................................... 2 ACKNOWLEDGEMENTS ........................................................................................................................ 3 CHAPTER 1: INTRODUCTION AND MOTIVATION ...........................................................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016