2020
DOI: 10.24251/hicss.2020.522
|View full text |Cite
|
Sign up to set email alerts
|

Can Trust be Trusted in Cybersecurity?

Abstract: Human compliance in cybersecurity continues to be a persistent problem for organizations. This researchin-progress advances theoretical understanding of the negative effects of trust formed between individuals and the cybersecurity function (i.e., those responsible for protection), cybersecurity system (i.e., the protective technologies), and organization (i.e., those verifying (e.g., hiring, championing, vouching.) the cybersecurity department) that leads to suboptimal compliance behaviors. In contrast to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 47 publications
(92 reference statements)
0
2
0
Order By: Relevance
“…Consequently, organisations must be attentive to what the stakeholders mention about them in social media. Cybersecurity issues could impact an organisation's reputation (Ursillo & Arnold, 2019), while at the same time, the cybersecurity function can help to mitigate cybersecurity threats (Pienta et al, 2020). Cyberattacks can ruin an organisation's reputation (Perera et al, 2022).…”
Section: Organisation Reputation Riskmentioning
confidence: 99%
“…Consequently, organisations must be attentive to what the stakeholders mention about them in social media. Cybersecurity issues could impact an organisation's reputation (Ursillo & Arnold, 2019), while at the same time, the cybersecurity function can help to mitigate cybersecurity threats (Pienta et al, 2020). Cyberattacks can ruin an organisation's reputation (Perera et al, 2022).…”
Section: Organisation Reputation Riskmentioning
confidence: 99%
“…Trust management in cyber-security is based on the relationships between these peers including (1) people and groups, (2) people and organizations, (3) organizations, and (4) people and technology. Each of these trusting peers can deploy cyber-security countermeasures that an individual can rely on to prevent and defend against cyber-attacks [1].…”
Section: Introductionmentioning
confidence: 99%