2014
DOI: 10.1016/j.sbspro.2014.07.133
|View full text |Cite
|
Sign up to set email alerts
|

The Human Factor of Information Security: Unintentional Damage Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

2
37
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(39 citation statements)
references
References 6 publications
2
37
0
Order By: Relevance
“…The authors of [54] suggest that to effectively communicate security risks, users should be categorized according to their IT knowledge. Whereas a user education approach in risk communication that improves user's self-confidence and stresses on his responsibility of his own protection is recommended by authors of [19][55] [56]. However, [51] argue that due to the timing and used terminology, information security threats warnings are easily and often ignored.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [54] suggest that to effectively communicate security risks, users should be categorized according to their IT knowledge. Whereas a user education approach in risk communication that improves user's self-confidence and stresses on his responsibility of his own protection is recommended by authors of [19][55] [56]. However, [51] argue that due to the timing and used terminology, information security threats warnings are easily and often ignored.…”
Section: Related Workmentioning
confidence: 99%
“…Then we should judge the distance from the endpoint to the edge of the fingerprint image. If it is less than the threshold value, remove it [5]. The way of eliminating internal pseudo feature points is as follows: there're 4 types internal pseudo feature points, short -term, burr, bridge and ring.…”
Section: B Extraction Of Fingerprint Image Featurementioning
confidence: 99%
“…Despite this, the information security community does not have a thorough understanding of what constitutes a human error and often resorts to general basic awareness or training on information security following an incident rather than dealing with the causal factors (Mahfuth et al, 2017). Current practices fall regularly short of identifying the actual root cause of human error related information security incidents even though people are recognized as being the weakest link in information security controls (Metalidou et al, 2014;Halevi et al, 2017;Mahfuth et al, 2017;Parsons et al, 2017;Furnell et al, 2018). There are also no established human error information security frameworks in practice to enable not only effective resolution of human error related information security incidents but also the prevention of these events.…”
Section: Introductionmentioning
confidence: 99%