Infrastructure Cyber-Attack Awareness Training: Effective or Not?

被引:0
|
作者
White, Garry L. [1 ]
机构
[1] Texas State Univ, San Marcos, TX 78666 USA
关键词
Catastrophic Cyber Attack; Countermeasures; Cyber Self-Efficacy; Cyber-Warfare; Technology Optimism; Worry; CONFIRMATORY FACTOR-ANALYSIS; SELF-EFFICACY; SECURITY; WORRY; DISASTER; BEHAVIOR; IMPACT;
D O I
10.4018/IJISP.291702
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The purpose of this study is to provide insight as to how infrastructure countermeasures awareness training will impact individuals dealing with a nationwide catastrophic cyber-attack. Can this awareness training lessen the psychological effect of an attack? This study showed no value for this type of training. Reading about such an attack, the subjects had lower technical optimism and cyber self-efficacy. Reading about infrastructure countermeasures, before or after reading about a cyberattack, did not improve or maintain the subjects' optimism and self-efficacy. A possible explanation is that emotional arousal may override or block rational thinking. Another explanation may be that a nationwide attack is towards the infrastructure and not the personal computer. Here the individual lacks any control. Future research needs to look at personal preparation and response training to see if it will help the psychological effects of a catastrophic cyber-attack.
引用
收藏
页数:26
相关论文
共 50 条
  • [31] Data Mining Based Cyber-Attack Detection
    TIANFIELD Huaglory
    系统仿真技术, 2017, 13 (02) : 90 - 104
  • [32] Predictive model for multistage cyber-attack simulation
    Kour, Ravdeep
    Thaduri, Adithya
    Karim, Ramin
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2020, 11 (03) : 600 - 613
  • [33] Studying The Impacts of Cyber-attack On Smart Grid
    Meraj, Tanzim
    Sharmin, Shaela
    Mahmud, Asif
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2015, : 461 - 466
  • [34] Predictive model for multistage cyber-attack simulation
    Ravdeep Kour
    Adithya Thaduri
    Ramin Karim
    International Journal of System Assurance Engineering and Management, 2020, 11 : 600 - 613
  • [35] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 203 - 210
  • [36] A systematic classification scheme for cyber-attack taxonomy
    Kim, S.
    Shin, J.
    Heo, G.
    Song, J. G.
    SAFETY AND RELIABILITY - SAFE SOCIETIES IN A CHANGING WORLD, 2018, : 3013 - 3019
  • [37] Impact of Cyber-Attack on Isolated Power System
    Sahabuddin, Md.
    Dutta, Bilash
    Hassan, Mehedi
    2016 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION & COMMUNICATION TECHNOLOGY (ICEEICT), 2016,
  • [38] Labour calls for inquiry into NHS cyber-attack
    O'Dowd, Adrian
    BMJ-BRITISH MEDICAL JOURNAL, 2017, 357
  • [39] Cyber-Attack Modeling Analysis Techniques: An Overview
    AL-Mohannadi, Hamad
    Mirza, Qublai
    Namanya, Anitta
    Awan, Irfan
    Cullen, Andrea
    Disso, Jules
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 69 - 76
  • [40] Cyber-Attack Risks Analysis Based on Attack-Defense Trees
    Sun, Wenjun
    Lv, Liqun
    Su, Yang
    Wang, Xu An
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 667 - 678