Affiliation:
1. Cybersecurity Policy Fellow, New America Think Tank, Washington, DC, USA ; University of Maryland University College , Adelphi , MD, USA
Abstract
Abstract
Human factors remained unexplored and underappreciated in information security. The mounting cyber-attacks, data breaches, and ransomware attacks are a result of human-enabled errors, in fact, 95% of all cyber incidents are human-enabled. Research indicates that existing information security plans do not account for human factors in risk management or auditing. Corporate executives, managers, and cybersecurity professionals rely extensively on technology to avert cybersecurity incidents. Managers fallaciously believe that technology is the key to improving security defenses even though research indicates that new technologies create unintended consequences; nonetheless, technological induced errors are human-enabled. Managers’ current perspective on the human factors problem information security is too narrow in scope and more than a training problem. The management of complex cybersecurity operations accompanied by mounting human factor challenges exceeds the expertise of most information security professionals; yet, managers are reluctant to seek the expertise of human factors specialists, cognitive scientists, and behavioral analysts to implement effective strategies and objectives to reduce human-enabled error in information security.
Reference52 articles.
1. [1] A Eurocontrol FAA Action Plan 15 White Paper. (2015 December). A human performance standard or excellence.
2. [2] Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50, 179-211.10.1016/0749-5978(91)90020-T
3. [3] Alavi, R., Islam, S., &Mouratidis, H. (2016). An information security risk-driven investment model for analysing human factors. Information &Computer Security, 24(2), 205-227.10.1108/ICS-01-2016-0006
4. [4] Albrechtsen, E. &Hovden, J. (2010). Improving information security awareness and behavior through dialogue, participation and collective reflection. An intervention study. Computers &Security, 29, 432-445.10.1016/j.cose.2009.12.005
5. [5] Alfawaz, S., Nelson, K. &Mohannak, K. (2010). Information security culture: A behavior compliance conceptual framework. Eighth Australasian Information Security Conference, Brisbane, Australia.
Cited by
55 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献