scholarly journals Emerging Threats for the Human Element and Countermeasures in Current Cyber Security Landscape

2019 ◽  
pp. 1264-1269 ◽  
Author(s):  
Vladlena Benson ◽  
John McAlaney ◽  
Lara A. Frumkin

The chapter presents an overview of emerging issues in the psychology of human behaviour and the evolving nature of cyber threats. It reflects on the role of social engineering as the entry point of many sophisticated attacks and highlights the relevance of the human element as the starting point of implementing cyber security programmes in organisations as well as securing individual online behaviour. Issues associated with the emerging trends in human behaviour research and ethics are presented for further discussion. The chapter concludes with a set of open research questions warranting immediate academic attention to avoid the exponential growth of information breaches in the future.

Author(s):  
Vladlena Benson ◽  
John McAlaney ◽  
Lara A. Frumkin

The chapter presents an overview of emerging issues in the psychology of human behaviour and the evolving nature of cyber threats. It reflects on the role of social engineering as the entry point of many sophisticated attacks and highlights the relevance of the human element as the starting point of implementing cyber security programmes in organisations as well as securing individual online behaviour. Issues associated with the emerging trends in human behaviour research and ethics are presented for further discussion. The chapter concludes with a set of open research questions warranting immediate academic attention to avoid the exponential growth of information breaches in the future.


2017 ◽  
Vol 20 (7) ◽  
pp. 2411-2431 ◽  
Author(s):  
Tania Cabello-Hutt ◽  
Patricio Cabello ◽  
Magdalena Claro

This article presents a study that applies integrated and multi-factor path analysis to report the direct and indirect effects of young Brazilian individual and home factors on their online opportunities and risks. The results show that engaging in more online opportunities, being older and having a lower level of parental mediation are associated with a higher number of online risks. At the same time, being older, having Internet access at home, having parents with a higher educational level, possessing more digital skills and receiving a higher level of co-use and active parental mediation are positively associated with online opportunities. Although restrictive parental mediation is negatively associated with online risks, it also reduces opportunities. In addition, co-use and active mediation are positively associated with parental educational level. These findings offer a starting point to understand children’s online behaviour and digital inclusion in Latin America and analyse its differences with other regions.


2014 ◽  
pp. 260-281
Author(s):  
Giovanna Dondossola ◽  
Fabrizio Garrone ◽  
Judit Szanto

The objective of the chapter is to present the role of cyber security experiments within a methodological approach for the evaluation of cyber risks in grid control systems. As a starting point, a cyber-power risk index has been defined to support the identification of relevant risk factors across network attack models. Instances of attack models have been then experimented on an ICT architecture implementing grid operation scenarios with the double aim of evaluating the attacks' effects by means of communication performance measures and of tuning the configuration of security mechanisms. The chapter discusses the results of a variety of attack experiments and their role in the calculation of the risk index.


Author(s):  
Giovanna Dondossola ◽  
Fabrizio Garrone ◽  
Judit Szanto

The objective of the chapter is to present the role of cyber security experiments within a methodological approach for the evaluation of cyber risks in grid control systems. As a starting point, a cyber-power risk index has been defined to support the identification of relevant risk factors across network attack models. Instances of attack models have been then experimented on an ICT architecture implementing grid operation scenarios with the double aim of evaluating the attacks’ effects by means of communication performance measures and of tuning the configuration of security mechanisms. The chapter discusses the results of a variety of attack experiments and their role in the calculation of the risk index.


This study aims to explore the role of social engineering in threatening cyber security by clarifying the concepts related to social engineering and its seriousness due to unlink to devices and equipment in general and its dependence on addressing the human psychic mechanisms known for curiosity. The study is based on the descriptive analysis studies that were based on the survey methodology using the questionnaire as a data collection tool, which was distributed to 98 respondents. The study found that the majority of the respondents had no idea about social engineering, and many of the females were rapidly clicking the links.. The study found that m these links can be attractive. The study found that there are significant differences between digital social engineering and hacking of phones and computers..


Author(s):  
Anne-Marie Mohammed ◽  
Vladlena Benson ◽  
George Saridakis

This article seeks to gain a better understanding of how to address some of the challenges in the digital world. In order to do this, the authors presented some of the emerging issues in the psychology of human behavior and the ever changing nature of cyber threats in the digital world. They reviewed both the theories of crime (i.e., self-control and rational choice theories) and the empirical studies that have examined user behavior on social networking sites leading to victimization. Importantly, they mentioned the role of social engineering as the entry point of many of these sophisticated attacks. They went on to examine the relevance of the human element as the starting point of implementing cyber security programs in organizations as well as securing individual online behavior. Furthermore, issues that are associated with the emerging trends in human behavior research as well as ethics were also discussed. They acknowledge that much more academic attention is needed in this area to avoid the exponential growth of future information breaches.


2012 ◽  
Author(s):  
Michael McNeese ◽  
Nancy J. Cooke ◽  
Anita D'Amico ◽  
Mica R. Endsley ◽  
Cleotilde Gonzalez ◽  
...  
Keyword(s):  

2020 ◽  
Vol 10 (3) ◽  
pp. 186-193
Author(s):  
REN YANYAN ◽  

The friendship between nations lies in the mutual affinity of the people, and the people’s affinity lies in the communion of hearts. The cultural and humanities cooperation between China and Russia has a long history. In recent years, under the role of the“Belt and Road” initiative, the SCO, and the Sino-Russian Humanities Cooperation Committee, Sino-Russian culture and humanities cooperation has continued to deepen. Entering a new era, taking the opportunity to promote Sino-Russian relations into a “new era China-Russia comprehensive strategic cooperative partnership”, the development of human relations between the two countries has entered a new historical starting point, while also facing a series of problems and challenges. This article is based on the current status of Sino-Russian human relations in the new era, interprets the characteristics of Sino-Russian human relations in the new era, analyzes the problems and challenges of Sino-Russian human relations in the new era, and tries to propose solutions and solutions with a view to further developing Sino-Russian cultural and humanities relations in the new era. It is a useful reference, and provides a reference for future related research, and ultimately helps the Sino-Russian cultural and humanities relations in the new era to be stable and far-reaching.


2011 ◽  
Vol 2 (2) ◽  
pp. 69-112
Author(s):  
Pierre Legendre

"Der Beitrag reevaluiert die «dogmatische Funktion», eine soziale Funktion, die mit biologischer und kultureller Reproduktion und folglich der Reproduktion des industriellen Systems zusammenhängt. Indem sie sich auf der Grenze zwischen Anthropologie und Rechtsgeschichte des Westens situiert, nimmt die Studie die psychoanalytische Frage nach der Rolle des Rechts im Verhalten des modernen Menschen erneut in den Blick. </br></br>This article reappraises the dogmatic function, a social function related to biological and cultural reproduction and consequently to the reproduction of the industrial system itself. On the borderline of anthropology and of the history of law – applied to the West – this study takes a new look at the question raised by psychoanalysis concerning the role of law in modern human behaviour. "


10.28945/3248 ◽  
2008 ◽  
Author(s):  
Cecille Marsh

Previous research conducted by the author investigated the socio-political backgrounds of two groups of female students studying computer-related university programmes. They came from distinctly different backgrounds and were enrolled at two institutions with very different legacies. The author found that socio-political factors, in particular the role of a dominant female household head and aggressive governmental affirmative action, had a significant effect on the girls’ levels of confidence and subsequently on their decision to study computer-related courses. Based on this insight, the researcher undertook to look further into gender diversity with respect to self-perceived general computer confidence and self-perceived ability to program a computer. A sample of both female and male Information T echnology students from very similar disadvantaged socio-economic backgrounds was surveyed. The sample of 204 students was drawn from all three years of the National Diploma in Information Technology. The author considered the following research questions: (i) Do males and females studying computer-related courses have differing computer selfefficacy levels? (ii) Do males and females studying computer programming have differing attitudes towards their ability to program? (iii) Do males and females differ in their attitudes towards the programming learning environment?


Sign in / Sign up

Export Citation Format

Share Document