Impact of the Human Element on Information Security

Author(s):  
Mahi Dontamsetti ◽  
Anup Narayanan

This chapter discusses the impact of the human element in information security. We are in the third generation of information security evolution, having evolved from a focus on technical, to process based, to the current focus on the human element. Using case studies, the authors detail how existing technical and process based controls are circumvented, by focusing on weaknesses in human behavior. Factors that affect why individuals behave in a certain way, while making security decisions are discussed. A psychology framework called the conscious competence model is introduced. Using this model, typical individual security behavior is broken down into four quadrants using the individuals’ consciousness and competence. The authors explain how the model can be used by individuals to recognize their security competency level and detail steps for learning more effective behavior. Shortfalls of existing training methods are highlighted and new strategies for increasing information security competence are presented.

Literatūra ◽  
2021 ◽  
Vol 63 (1) ◽  
pp. 71-85
Author(s):  
Aušra Jurgutienė

 In the article I discuss how deconstruction (Jacques Derrida and other Yale School participants) came to Lithuanian literary criticism  and how it changed habits of humanitarian thinking during the three decades after independence. The most unusual and radical deconstruction critique of essentialist metaphysical thinking, new terminology (inter-text, elimination of center, footprint, writing, difference, blinding, labyrinth narrative, guest / enemy, etc.) and new strategies for interpreting texts were very important for Lithuanian humanities liberated from Soviet ideology.  Literary critics have noticed and discussed the undoubted connection between postmodernist literature and its deconstructive reading.We can find three tendencies in the deconstructive criticism of Lithuanian literature. The first tendency is the interpretation of general theoretical concepts of deconstruction, second tendency - searching the deconstructive features in literary works and the third tendency of criticism, expanding its own self-criticism and self-irony, is discussing chrestomathic and structuralist interpretations of the literary works or deconstructing icons of Soviet culture. We know very well, that many feminist, postcolonial, historiographic, anthropological, or interdisciplinary researches of literature cannot escape the effects of deconstruction. 


2021 ◽  
Vol 13 (11) ◽  
pp. 6077
Author(s):  
Woo Jin Lee ◽  
Inho Hwang

As organizations’ interest in information resources expands, their investments in information security (IS), such as the introduction of IS policies and new technologies, are also expanding. Nevertheless, IS incidents and threats within the organization have not decreased. This study aims to protect organizations’ information assets by maintaining the level of continuous IS behavior of the organization insiders. Moreover, this study suggests a method to induce continuous security behavior of individuals by confirming the relationship between IS-related voice behavior and IS-related organizational justice, which is an action concept that provides continuous opinions to achieve security goals. This study derives research models and hypotheses through previous studies and tests hypotheses through structural equation modeling. The target subjects are members of the organization who introduced the IS policy. A total of 325 samples were secured through the questionnaire method, and hypotheses were verified. Results reveal that voice behavior related to IS is negatively influenced by work impediment and positively influenced by organizational identification. In addition, procedural and information justice that influence prior actions related to IS affect the cause of personal security behavior (work impediment and organizational identification). Additionally, justice sensitivity adjusted the impact relationship between IS-related organizational justice and the cause of security behavior. The study presents the importance of voice behavior in maintaining the level of IS within the organization continuously. Moreover, it has practical implications in that efforts to improve organizational justice and voice behaviors vary according to the level of individual justice sensitivity.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kavya Sharma ◽  
Xinhui Zhan ◽  
Fiona Fui-Hoon Nah ◽  
Keng Siau ◽  
Maggie X. Cheng

PurposePhishing attacks are the most common cyber threats targeted at users. Digital nudging in the form of framing and priming may reduce user susceptibility to phishing. This research focuses on two types of digital nudging, framing and priming, and examines the impact of framing and priming on users' behavior (i.e. action) in a cybersecurity setting. It draws on prospect theory, instance-based learning theory and dual-process theory to generate the research hypotheses.Design/methodology/approachA 3 × 2 experimental study was carried out to test the hypotheses. The experiment consisted of three levels for framing (i.e. no framing, negative framing and positive framing) and two levels for priming (i.e. with and without priming).FindingsThe findings suggest that priming users to information security risks reduces their risk-taking behavior, whereas positive and negative framing of information security messages regarding potential consequences of the available choices do not change users' behavior. The results also indicate that risk-averse cybersecurity behavior is associated with greater confidence with the action, greater perceived severity of cybersecurity risks, lower perceived susceptibility to cybersecurity risks resulting from the action and lower trust in the download link.Originality/valueThis research shows that digital nudging in the form of priming is an effective way to reduce users' exposure to cybersecurity risks.


2016 ◽  
Vol 13 (1) ◽  
pp. 159-168
Author(s):  
Bayram Unal

This study aims at understanding how the perceptions about migrants have been created and transferred into daily life as a stigmatization by means of public perception, media and state law implementations.  The focus would be briefly what kind of consequences these perceptions and stigmatization might lead. First section will examine the background of migration to Turkey briefly and make a summary of migration towards Turkey by 90s. Second section will briefly evaluate the preferential legal framework, which constitutes the base for official discourse differentiating the migrants and implementations of security forces that can be described as discriminatory. The third section deals with the impact of perceptions influential in both formation and reproduction of inclusive and exclusive practices towards migrant women. Additionally, impact of public perception in classifying the migrants and migratory processes would be dealt in this section.


Author(s):  
Russell Cameron Thomas ◽  
Marcin Antkiewicz ◽  
Patrick Florer ◽  
Suzanne Widup ◽  
Matthew Woodyard

Sign in / Sign up

Export Citation Format

Share Document