Research of Human Factors in Information Security

The article represents results of research of information security problem in social and human aspects. Authors assume that information sciences are usually focused on detecting and further processing of technical mechanisms and tools for support of information security. However, the analysis of social and human factors influencing growth of criminality in the field of information technologies, search for complex measures and methods aiming to decrease human risks arising from computer criminality is very important as well . One of solutions for information security problem in credit and financial spheres is shown on the example of bank system of Russia. Special attention is drawn to analysis of specificity and dynamics of hacker subculture, its place in cybercrime, taking into account interdisciplinary direction of research of the information security problem. The authors of the article came to the conclusion that early detecting and studying existing and potential threats, notifying  system administrators and other technical personnel on such threats and coordinating their activity, as well as cultural and educational policy of states and international communities aiming to create a positive information security expert image, are very important for the information security support .

[1]  Mark Warschauer,et al.  The information age: Economy, society and culture. , 1998 .

[2]  U. Beck,et al.  Varieties of second modernity: the cosmopolitan turn in social and political theory and research. , 2010, The British journal of sociology.

[3]  Helen Nissenbaum,et al.  The Internet in Public Life , 2004 .

[4]  M. Castells The Internet Galaxy , 2001 .

[5]  Drew Harrington The Hacker Ethic and the Spirit of the Information Age , 2002 .

[6]  Jacob Appelbaum,et al.  Cypherpunks: Freedom and the Future of the Internet , 2012 .

[7]  H. Hsu,et al.  Intellectual Capital , 2010 .

[8]  Gideon Rose,et al.  Mapping the Global Future: Report of the National Intelligence Council's 2020 Project , 2005 .

[9]  A. Giddens Runaway World: How Globalization is Reshaping Our Lives , 1999 .

[10]  Steven Levy,et al.  Hackers: Heroes of the Computer Revolution , 1984 .

[11]  William L. Simon,et al.  The Art of Intrusion , 2005 .

[12]  Randall F. Trzeciak,et al.  Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector , 2012 .

[13]  Parmy Olson We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency , 2012 .

[14]  Mudge Insider Threat , 2003, login Usenix Mag..

[15]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[16]  Ervin Laszlo,et al.  Macroshift: Navigating the Transformation to a Sustainable World , 1994 .

[17]  E. Cole,et al.  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft , 2005 .