How Human Issues Impact Confronting Cyber Terrorism

被引:0
|
作者
Houston, Nancy [1 ,2 ]
机构
[1] Univ Advancing Technol, Tempe, AZ 85283 USA
[2] Acad Art Univ, San Francisco, CA USA
来源
TERRORIST USE OF CYBERSPACE AND CYBER TERRORISM: NEW CHALLENGES AND RESPONSES | 2015年 / 42卷
关键词
Human behavior; cyber security; cognitive load; bias; incentives; SITUATION AWARENESS; EXPERIENCE;
D O I
10.3233/978-1-61499-528-9-102
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Human behavior plays a major role in the effectiveness of cyber security efforts although the human typically receives far less attention than the technology. Perhaps the greatest challenge to cyber security is that people are inherently behind each cyber problem as well as its solution [1]. This paper examines the behavioral aspects of cognitive overload, bias, and incentives. These aspects of human behavior all affect the decision making of those who develop policy and strategy, those who fall victim to cyber attacks, and those who initiate cyber attacks.
引用
收藏
页码:102 / 115
页数:14
相关论文
共 50 条
  • [1] The economic impact of cyber terrorism
    Hua, Jian
    Bapna, Sanjay
    JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2013, 22 (02): : 175 - 186
  • [2] How can we deter cyber terrorism?
    Khey, David N.
    POLICING-AN INTERNATIONAL JOURNAL OF POLICE STRATEGIES & MANAGEMENT, 2013, 36 (02) : 464 - 465
  • [3] How Can We Deter Cyber Terrorism?
    Hua, Jian
    Bapna, Sanjay
    INFORMATION SECURITY JOURNAL, 2012, 21 (02): : 102 - 114
  • [4] Confronting Terrorism
    Singh, Prashant
    INDIA QUARTERLY-A JOURNAL OF INTERNATIONAL AFFAIRS, 2011, 67 (01): : 81 - 84
  • [5] Confronting Terrorism
    Gupta, Arvind
    STRATEGIC ANALYSIS, 2011, 35 (02) : 332 - 334
  • [6] CONFRONTING NUCLEAR TERRORISM
    GOLDSTEIN, ME
    USA TODAY, 1980, 109 (2426): : 15 - 17
  • [7] Iran: Confronting terrorism
    Sick, G
    WASHINGTON QUARTERLY, 2003, 26 (04): : 83 - 98
  • [8] TERRORISM AND HUMAN-RIGHTS ISSUES
    MCCOLM, RB
    TERRORISM, 1987, 10 (01): : 79 - 81
  • [9] Confronting cyber uncertainty
    Grimes, John G.
    CrossTalk, 2008, 21 (07):
  • [10] Confronting Terrorism in Saudi Arabia
    Gendron, Angela
    INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTERINTELLIGENCE, 2010, 23 (03) : 487 - 508