The "Human Factor" In Cybersecurity: Exploring the Accidental Insider
暂无分享,去创建一个
[1] P. Briggs,et al. Behavior Change Interventions for Cybersecurity , 2017 .
[2] David A Bennett,et al. Conscientiousness and the incidence of Alzheimer disease and mild cognitive impairment. , 2007, Archives of general psychiatry.
[3] Frank L. Greitzer,et al. Identifying at-risk employees: A behavioral model for predicting potential insider threats , 2010 .
[4] Malcolm Robert Pattinson,et al. The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies , 2017, Comput. Secur..
[5] C. F. Kao,et al. The efficient assessment of need for cognition. , 1984, Journal of personality assessment.
[6] Christian W. Probst,et al. Countering Insider Threats , 2008 .
[7] J. D. Tygar,et al. Usability of Security: A Case Study, , 1998 .
[8] Serge Egelman,et al. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) , 2015, CHI.
[9] Wu He,et al. Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..
[10] Marcus A. Butavicius,et al. Test-retest reliability and internal consistency of the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2016, ACIS.
[11] Reginald A. Bruce,et al. Decision-Making Style: The Development and Assessment of a New Measure , 1995 .
[12] Christian W. Probst,et al. Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[13] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[14] Serge Egelman,et al. Predicting privacy and security attitudes , 2015, CSOC.
[15] Ivan Flechais,et al. Usable Security: Why Do We Need It? How Do We Get It? , 2005 .
[16] Jeff Joireman,et al. Promotion Orientation Explains Why Future-Oriented People Exercise and Eat Healthy , 2012, Personality & social psychology bulletin.
[17] Sadie Creese,et al. Trustworthy and effective communication of cybersecurity risks: A review , 2011, 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST).
[18] L. Hadlington. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours , 2017, Heliyon.
[19] Aad P. A. van Moorsel,et al. SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment , 2014, HCI.
[20] Carrie Gates,et al. Defining the insider threat , 2008, CSIIRW '08.
[21] ParsonsKathryn,et al. The Human Aspects of Information Security Questionnaire (HAIS-Q) , 2017 .
[22] Derya Ergun Ozler,et al. CYBERLOAFING PHENOMENON IN ORGANIZATIONS: DETERMINANTS AND IMPACTS , 2012 .
[23] P. Dolan,et al. Influencing behaviour: The mindspace way , 2012 .
[24] Kathryn Parsons,et al. Can Cyberloafing and Internet Addiction Affect Organizational Information Security? , 2017, Cyberpsychology Behav. Soc. Netw..
[25] Jason R. C. Nurse,et al. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? , 2014, ArXiv.
[26] Shari Lawrence Pfleeger,et al. Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..
[27] Kathryn B. Laskey,et al. Developing an Ontology for Individual and Organizational Sociotechnical Indicators of Insider Threat Risk , 2016, STIDS.
[28] John Leach,et al. Improving user security behaviour , 2003, Comput. Secur..
[29] Matthew Tischer,et al. Users Really Do Plug in USB Drives They Find , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[30] Dieter Gollmann,et al. Insider Threats in Cyber Security , 2010, Insider Threats in Cyber Security.
[31] Reference John,et al. Big Five Inventory (bfi) , 2022 .
[32] Dawn M. Cappelli,et al. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes , 2012 .
[33] Aad P. A. van Moorsel,et al. Nudging towards security: developing an application for wireless network selection for android phones , 2015, BCS HCI.
[34] Bilal Khan,et al. Effectiveness of information security awareness methods based on psychological theories , 2011 .
[35] Keven G. Ruby,et al. The Insider Threat to Information Systems , 2022 .
[36] Malcolm Robert Pattinson,et al. Individual differences and Information Security Awareness , 2017, Comput. Hum. Behav..
[37] Dawn M. Cappelli,et al. Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors , 2005 .
[38] Malcolm Robert Pattinson,et al. Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q) , 2014, Comput. Secur..
[39] Mo Adam Mahmood,et al. Compliance with Information Security Policies: An Empirical Investigation , 2010, Computer.
[40] E. Weber,et al. A Domain-Specific Risk-Taking (DOSPERT) Scale for Adult Populations , 2006, Judgment and Decision Making.