Social Psychology: An under-used tool in Cybersecurity

In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties and greater understanding of the risks and consequences for cyber attackers and defenders alike.

[1]  Nicolas Chantler,et al.  Profile of A Computer Hacker , 2001 .

[2]  Gabriella Coleman Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2014 .

[3]  Paul A. Taylor,et al.  Hackers: Crime in the Digital Sublime , 1999 .

[4]  A. Joinson Disinhibition and the Internet , 2007 .

[5]  Ryan Seebruck,et al.  A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model , 2015, Digit. Investig..

[6]  Leonhard Dobusch,et al.  Fluidity, Identity, and Organizationality: The Communicative Constitution of Anonymous , 2015 .

[7]  Marcus K. Rogers,et al.  The Psyche of Cybercriminals: A Psycho-Social Perspective , 2011 .

[8]  Peter Krapp Terror and Play, or What Was Hacktivism? , 2005, Grey Room.

[9]  Mary Manjikian,et al.  From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik , 2010 .

[10]  A. Barak,et al.  The benign online disinhibition effect: Could situational factors induce self-disclosure and prosocial behaviors? , 2015 .

[11]  Michael S. Bernstein,et al.  4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community , 2011, ICWSM.

[12]  Sumit Ghosh,et al.  Cybercrimes: A Multidisciplinary Analysis , 2011 .

[13]  J. Gackenbach Psychology and the Internet : intrapersonal, interpersonal, and transpersonal implications , 1998 .

[14]  Carina Gunnarson Changing the game: Addiopizzo's mobilisation against racketeering in Palermo , 2014 .

[15]  Marcus K. Rogers,et al.  A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..

[16]  Bill Landreth,et al.  Out of the inner circle : a hacker's guide to computer security , 1985 .

[17]  J. Suler The Online Disinhibition Effect , 2004, Cyberpsychology, Behavior, and Social Networking.