Proceedings of the 20th Annual SIG Conference on Information Technology Education 2019
DOI: 10.1145/3349266.3351407
|View full text |Cite
|
Sign up to set email alerts
|

Human Risk Factors in Cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…There has also been conducted multiple phishing and social engineering studies of students and faculty in HE, for example, Diaz et al [25] and Cuchta et al [26], both documenting a high level of susceptibility to phishing attacks in academia. Related to phishing-attacks, Dadkhah [27] reviews cyber-attacks in scholarly publishing, such as the fraudulent call for papers, and reviews attackers strategies employed to fool scholars.…”
Section: Previous Work On Information Security In Hementioning
confidence: 99%
See 1 more Smart Citation
“…There has also been conducted multiple phishing and social engineering studies of students and faculty in HE, for example, Diaz et al [25] and Cuchta et al [26], both documenting a high level of susceptibility to phishing attacks in academia. Related to phishing-attacks, Dadkhah [27] reviews cyber-attacks in scholarly publishing, such as the fraudulent call for papers, and reviews attackers strategies employed to fool scholars.…”
Section: Previous Work On Information Security In Hementioning
confidence: 99%
“…• Literature not written in either English or Norwegian • Studies that do not focus on risk related topics faced by the academic industry (e.g., papers on cybersecurity education [37,38], legal issues [21,22], or issue specific topics in HE [26,39].…”
mentioning
confidence: 99%
“…Interventions for employees, such as training, must be fun and provide direct benefits. Easily understandable documents with visual cues can make such training more effective (Cuchta et al, 2019). If the training is playful, competition occurs, and feedback can be provided, which will make the intervention more exciting and successful.…”
Section: Implications For Practicementioning
confidence: 99%
“…However, each covers its focus from the perspective of risk management, and none of them explicitly identifies which indicators should be taken into account for a data-based approach that translates into indicators that can be used proactively. In this work developed by ENISA [35], [41] and other researchers, we understand the need to create a more focused methodology on management indicators and data that can be used proactively. By analyzing the broad collection of RM frameworks and methodologies presented in the previous table, we identified several factors that limit the potential of RM frameworks and methodologies.…”
Section: Existing Framework Reviewed and Analyzedmentioning
confidence: 99%
“…Despite several existing works on cybersecurity risk management, the literature does not present works considering such contextual information when performing risk management for critical infrastructures [12], [41].…”
Section: Problem Identification and Research Question(s)mentioning
confidence: 99%