The Role of User Behaviour in Improving Cyber Security Management

被引:12
|
作者
Moustafa, Ahmed A. [1 ,2 ,3 ]
Bello, Abubakar [4 ]
Maurushat, Alana [4 ]
机构
[1] Western Sydney Univ, Sch Psychol, Sydney, NSW, Australia
[2] Western Sydney Univ, Marcs Inst Brain Behav & Dev, Sydney, NSW, Australia
[3] Univ Johannesburg, Fac Hlth Sci, Dept Human Anat & Physiol, Johannesburg, South Africa
[4] Western Sydney Univ, Sch Social Sci, Sydney, NSW, Australia
来源
FRONTIERS IN PSYCHOLOGY | 2021年 / 12卷
关键词
cyber security; social engineering; information security; phishing; cognitive hacking; DRIFT-DIFFUSION MODEL; DARK TRIAD; DECISION-MAKING; COGNITIVE HACKING; POLICY COMPLIANCE; RISK-TAKING; REWARD; PERSONALITY; DOPAMINE; REINFORCEMENT;
D O I
10.3389/fpsyg.2021.561011
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term 'information security' has recently been replaced with the more generic term cybersecurity. The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers' social engineering and cognitive hacking methods (i.e., spreading false information). Accordingly, in this paper, we identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks and crimes. Our review shows that computer system users possess different cognitive capabilities which determine their ability to counter information security threats. We identify gaps in the existing research and provide possible psychological methods to help computer system users comply with security policies and thus increase network and information security.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Improving user security behaviour
    Leach, J
    [J]. COMPUTERS & SECURITY, 2003, 22 (08) : 685 - 692
  • [2] Improving risk management – combining security and cyber insurance practices
    Baird P.
    [J]. Network Security, 2023, 2023 (11)
  • [3] Choosing Protection: User Investments in Security Measures for Cyber Risk Management
    Ben Yaakov, Yoav
    Wang, Xinrun
    Meyer, Joachim
    An, Bo
    [J]. DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 33 - 44
  • [4] Management's role in information security in a cyber economy
    Dutta, A
    McCrohan, K
    [J]. CALIFORNIA MANAGEMENT REVIEW, 2002, 45 (01) : 67 - +
  • [5] Secu-One: A Proposal of Cyber Security Exercise Tool for Improving Security Management Skill
    Omiya, Tan
    Kadobayashi, Youki
    [J]. PROCEEDINGS OF 2019 7TH INTERNATIONAL CONFERENCE ON INFORMATION AND EDUCATION TECHNOLOGY (ICIET 2019), 2019, : 259 - 268
  • [6] Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users
    Saridakis, George
    Benson, Vladlena
    Ezingeard, Jean-Noel
    Tennakoon, Hemamali
    [J]. TECHNOLOGICAL FORECASTING AND SOCIAL CHANGE, 2016, 102 : 320 - 330
  • [7] Mobile Devices and Cyber Security An Exploratory Study on User's Response to Cyber Security Challenges
    Kauthamy, Kanthithasan
    Ashrafi, Noushin
    Kuilboer, Jean-Pierre
    [J]. WEBIST: PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, 2017, : 306 - 311
  • [8] The role of cyber exercises in improving cyber readiness
    Reintam, Aare
    [J]. Network Security, 2024, 2024 (04)
  • [9] Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management
    Sharbaf, Mehrdad S.
    [J]. IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 332 - 337
  • [10] Improving the Cyber Security of SCADA Communication Networks
    Patel, Sandip C.
    Bhatt, Ganesh D.
    Graham, James H.
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (07) : 139 - 142