The Human Factors and Cybersecurity Policy

被引:0
|
作者
Qashqari, Alya A. [1 ]
Munshi, Asmaa M. [1 ]
Alturkstani, Haifaa A. [1 ]
Ghwati, Hadeel T. [1 ]
Alhebshi, Dalia H. [1 ]
机构
[1] Univ Jeddah, Dept Cybersecur, Coll Comp Sci & Engn, Jeddah, Saudi Arabia
关键词
cybersecurity awareness; human behavior; insider threat; policy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computer security is not limited to technology and systems; it also includes the humans and processes that use and depend on it. Even with strong computer security policies, humans are the weakest link in information security, even if people are aware of the policies, they may not act accordingly, leading to error. This paper presents studies that illustrate how human factors affect the cybersecurity, and explains the demographic features, such as gender, age, personality, and cultural background that are key determinants of an individual's attitude and behavior toward cybersecurity. Based on this review the paper discusses the concept of "insider threat" and how its potential impact on cybersecurity policies. its then proposes recommended solutions to handle insider threats and provides cybersecurity awareness and explains the importance of ensuring training and intervention programs on cybersecurity.
引用
收藏
页码:1 / 5
页数:5
相关论文
共 50 条
  • [31] Cybersecurity policy verification with declarative programming
    Rattikorn Hewett
    Phongphun Kijsanayothin
    Stephanie Bak
    Marry Galbrei
    Applied Intelligence, 2016, 45 : 83 - 95
  • [32] Policy dimensions of cybersecurity engineering challenges
    Schneider, Fred B.
    Millett, Lynette I.
    Bridge, 1600, 49 (03): : 33 - 39
  • [33] Cybersecurity policy verification with declarative programming
    Hewett, Rattikorn
    Kijsanayothin, Phongphun
    Bak, Stephanie
    Galbrei, Marry
    APPLIED INTELLIGENCE, 2016, 45 (01) : 83 - 95
  • [34] Fresh Tracks for Cybersecurity Policy Laterals
    Rauscher, Karl Frederick
    2012 THIRD WORLDWIDE CYBERSECURITY SUMMIT (WCS), 2012,
  • [35] Cybersecurity policy of Obama's Administration
    Batuev, E., V
    MGIMO REVIEW OF INTERNATIONAL RELATIONS, 2010, (04): : 271 - 276
  • [36] Maritime human factors and IMO policy
    Schroder-Hinrichs, Jens-Uwe
    Hollnagel, Erik
    Baldauf, Michael
    Hofmann, Sarah
    Kataria, Aditi
    MARITIME POLICY & MANAGEMENT, 2013, 40 (03) : 243 - 260
  • [37] SEC's cybersecurity disclosure guidance and disclosed cybersecurity risk factors
    Li, He
    No, Won Gyun
    Wang, Tawei
    INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 2018, 30 : 40 - 55
  • [38] Cybersecurity: Stakeholder incentives, externalities, and policy options
    Bauer, Johannes M.
    van Eeten, Michel J. G.
    TELECOMMUNICATIONS POLICY, 2009, 33 (10-11) : 706 - 719
  • [39] Direction of Japan's New Cybersecurity Policy
    Jun, Osawa
    ASIA-PACIFIC REVIEW, 2023, 30 (03) : 63 - 78
  • [40] Mission assurance policy and risk management in cybersecurity
    Cam H.
    Mouallem P.
    Environment Systems and Decisions, 2013, 33 (4) : 500 - 507