2019
DOI: 10.1108/jsit-02-2018-0028
|View full text |Cite
|
Sign up to set email alerts
|

Human factor security: evaluating the cybersecurity capacity of the industrial workforce

Abstract: Purpose -As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environment. Many recorded industrial cyber-attacks have successfully beaten technical security solutions by exploiting humanfactor vulnerabilities related to security knowledge and skills and manipulating human elements into inadvertently conveying access to critical industrial assets. Knowledge and ski… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
37
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(54 citation statements)
references
References 37 publications
0
37
0
2
Order By: Relevance
“…Education and training are one of the most essential principles of TPM that ensures that the employees and staff involved with the TPM have the proper knowledge and skills to have a successful deployment of TPM. This principle must get more serious attention since manufacturing systems often lack qualified employees regarding the skill and knowledge for cybersecurity incorporation with the production system [17,18]. Training current and future TPM employees including operators, maintenance staff, and managers on the potential threats of cybersecurity plays a key role in having a successful TPM implementation for smart manufacturing systems [19].…”
Section: Education and Trainingmentioning
confidence: 99%
See 1 more Smart Citation
“…Education and training are one of the most essential principles of TPM that ensures that the employees and staff involved with the TPM have the proper knowledge and skills to have a successful deployment of TPM. This principle must get more serious attention since manufacturing systems often lack qualified employees regarding the skill and knowledge for cybersecurity incorporation with the production system [17,18]. Training current and future TPM employees including operators, maintenance staff, and managers on the potential threats of cybersecurity plays a key role in having a successful TPM implementation for smart manufacturing systems [19].…”
Section: Education and Trainingmentioning
confidence: 99%
“…As can be seen from in this table while some of the pillars have received more attention from the research community others such as focused improvement and development management pillars demonstrate opportunities for researches. Less computer savvy operators [10][11][12]18] Focused improvement Consideration of losses regarding cyber-physical security [13] Planned maintenance Planning effective PM to prevent and mitigate cyber-physical attacks [14][15][16] Quality maintenance Detecting a quality issue regarding cyber-physical attacks and the ability to analyze its source [29][30][31] Education and training Improving cybersecurity skills and awareness of operators, maintenance staff, and management [17][18][19] Safety, health, and environment…”
Section: Early/equipment Managementmentioning
confidence: 99%
“…Second, the employment of individuals with low levels of skill makes SEs open to social engineering attacks (Bullee, Montoya, Pieters, Junger and Hartelk, 2018). It may also result in the improper use of data and information technologies, for example, through unintentional disclosure of sensitive data, or the use of information systems in a manner that circumvents policy or security measures (Ani, He and Tiwari, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…He and Tiwari, 2019). In many instances, the 'IT skills' that are possessed by individuals are limited to personal or 'domestic' experience of IT.…”
mentioning
confidence: 99%
“…According to Patel [8], one of the top cyber threats is phishing scams. Other threats are: ransomware attacks (like WannaCry), system vulnerability due to unchecked gaps (nearly 50% of alerts and logs are never investigated), new threats and dangers from and to AI (Artificial Intelligence) powered systems, and human weaknesses [9][10][11][12]. In 2018, HelpSystems [13] surveyed more than 600 IT and cybersecurity professionals to determine the main cybersecurity risks and mitigation strategies.…”
Section: Introductionmentioning
confidence: 99%