Infrastructure Cyber-Attack Awareness Training: Effective or Not?

被引:0
|
作者
White, Garry L. [1 ]
机构
[1] Texas State Univ, San Marcos, TX 78666 USA
关键词
Catastrophic Cyber Attack; Countermeasures; Cyber Self-Efficacy; Cyber-Warfare; Technology Optimism; Worry; CONFIRMATORY FACTOR-ANALYSIS; SELF-EFFICACY; SECURITY; WORRY; DISASTER; BEHAVIOR; IMPACT;
D O I
10.4018/IJISP.291702
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The purpose of this study is to provide insight as to how infrastructure countermeasures awareness training will impact individuals dealing with a nationwide catastrophic cyber-attack. Can this awareness training lessen the psychological effect of an attack? This study showed no value for this type of training. Reading about such an attack, the subjects had lower technical optimism and cyber self-efficacy. Reading about infrastructure countermeasures, before or after reading about a cyberattack, did not improve or maintain the subjects' optimism and self-efficacy. A possible explanation is that emotional arousal may override or block rational thinking. Another explanation may be that a nationwide attack is towards the infrastructure and not the personal computer. Here the individual lacks any control. Future research needs to look at personal preparation and response training to see if it will help the psychological effects of a catastrophic cyber-attack.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Generation Z: Cyber-Attack Awareness Training Effectiveness
    White, Garry
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2022, 62 (03) : 560 - 571
  • [2] Critical Infrastructure Cyber-Attack Through Firmware Exploitation
    Cuozzo, Gianni
    CRITICAL INFRASTRUCTURE PROTECTION AGAINST HYBRID WARFARE SECURITY RELATED CHALLENGES, 2016, 46 : 115 - 134
  • [3] Cyber-Attack as a Menace to Effective Governance in Nigeria
    Fayomi, Oluyemi
    Ndubisi, Oly Nelson
    Ayo, Charles
    Chidozie, Felix
    Ajayi, Lady
    Okorie, Uchechukwu
    PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON EGOVERNMENT, 2015, : 107 - 116
  • [4] Cyber-Attack Attributes
    Kadivar, Mehdi
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2014, : 22 - 27
  • [5] The Law of Cyber-Attack
    Hathaway, Oona A.
    Crootof, Rebecca
    Levitz, Philip
    Nix, Haley
    Nowlan, Aileen
    Perdue, William
    Spiegel, Julia
    CALIFORNIA LAW REVIEW, 2012, 100 (04) : 817 - 885
  • [6] Cyber-attack group analysis method based on association of cyber-attack information
    Son, Kyung-ho
    Kim, Byung-ik
    Lee, Tae-jin
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 260 - 280
  • [7] AVOIDITALS: Enhanced Cyber-attack Taxonomy in Securing Information Technology Infrastructure
    Syafrizal, Melwin
    Selamat, Siti Rahayu
    Zakaria, Nurul Azma
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 1 - 12
  • [8] Analysis and Evaluation of Cyber-attack Impact on Critical Power System Infrastructure
    Singh, Neeraj Kumar
    Mahajan, Vasundhara
    SMART SCIENCE, 2021, 9 (01) : 1 - 13
  • [9] Extending the cyber-attack landscape for SCADA-based critical infrastructure
    Rodofile, Nicholas R.
    Radke, Kenneth
    Foo, Ernest
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 14 - 35
  • [10] Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)
    Matey, Akwetey Henry
    Danquah, Paul
    Koi-Akrofi, Godfred Yaw
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 700 - 709