2016
DOI: 10.14236/ewic/hci2016.64
|View full text |Cite
|
Sign up to set email alerts
|

Social Psychology: An under-used tool in Cybersecurity

Abstract: In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties and greater understanding of the risks and consequences for cyber attackers and defenders alike.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 7 publications
(8 reference statements)
0
5
0
Order By: Relevance
“…The study of the personality of penetration testers found that penetration testers are more likely to be honest and humble when compared to other computer professionals (Opedal, 2019); therefore, high scores on the honesty-humility facet of personality is likely a key factor for who becomes a criminal hacker and who ends up employed as a penetration tester. Thackray et al (2016) noted that paranoia is common among hackers. The data from the interviews also identified paranoia as a concern among some of the interviewees.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The study of the personality of penetration testers found that penetration testers are more likely to be honest and humble when compared to other computer professionals (Opedal, 2019); therefore, high scores on the honesty-humility facet of personality is likely a key factor for who becomes a criminal hacker and who ends up employed as a penetration tester. Thackray et al (2016) noted that paranoia is common among hackers. The data from the interviews also identified paranoia as a concern among some of the interviewees.…”
Section: Discussionmentioning
confidence: 99%
“…However, Bruijne, Eeten, Gañán, and Pieters (2017) lament that there is a lack of a commonly agreed upon typology of hackers, but identified from their search of the literature that the following five dimensions exists: a) target, b) expertise, c) resources, d) organization, and e) motivation. Thackray et al (2016) argued that social psychology is an underutilized tool in cyber security, and psychological research into hackers enable increased understanding of motivations driving the hacker (Thackray et al 2016). Thackray et al (2016) notes that white hat hackers tend to be motivated by prestige and that curiosity and thrill seeking are motivators for hackers in general.…”
Section: Hacker Personalitiesmentioning
confidence: 99%
See 2 more Smart Citations
“…According to Derrick et al (2016) attackers could be thieves, organized criminals, political activists, terrorists, foreign government, or vehicle owners themselves. For example, groups of hacktivists might be motivated to participate in cyberattacks to develop a strong identity and the ethos for their group (Thackray et al, 2016). Developing methods to damage the identity of groups that attack AV might help to maintain security.…”
Section: Human Factor In Autonomous Vehicle Cybersecuritymentioning
confidence: 99%