Infrastructure Cyber-Attack Awareness Training: Effective or Not?

被引:0
|
作者
White, Garry L. [1 ]
机构
[1] Texas State Univ, San Marcos, TX 78666 USA
关键词
Catastrophic Cyber Attack; Countermeasures; Cyber Self-Efficacy; Cyber-Warfare; Technology Optimism; Worry; CONFIRMATORY FACTOR-ANALYSIS; SELF-EFFICACY; SECURITY; WORRY; DISASTER; BEHAVIOR; IMPACT;
D O I
10.4018/IJISP.291702
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The purpose of this study is to provide insight as to how infrastructure countermeasures awareness training will impact individuals dealing with a nationwide catastrophic cyber-attack. Can this awareness training lessen the psychological effect of an attack? This study showed no value for this type of training. Reading about such an attack, the subjects had lower technical optimism and cyber self-efficacy. Reading about infrastructure countermeasures, before or after reading about a cyberattack, did not improve or maintain the subjects' optimism and self-efficacy. A possible explanation is that emotional arousal may override or block rational thinking. Another explanation may be that a nationwide attack is towards the infrastructure and not the personal computer. Here the individual lacks any control. Future research needs to look at personal preparation and response training to see if it will help the psychological effects of a catastrophic cyber-attack.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Inductive and Deductive Reasoning to Assist in Cyber-Attack Prediction
    Marin, Ericsson
    Almukaynizi, Mohammed
    Shakarian, Paulo
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 262 - 268
  • [42] APT cyber-attack modelling - building a general model
    Lehto, Martti
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 121 - 129
  • [43] Compatibility Testing Laboratory Response to Hospital Cyber-Attack
    Hicks, D.
    Fatolitis, L.
    Prichard, A.
    James, L.
    TRANSFUSION, 2023, 63 : 268A - 269A
  • [44] Cyber-attack detection based on controlled invariant sets
    Rosich, Albert
    Voos, Holger
    Darouach, Mohamed
    2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 2176 - 2181
  • [45] Stealthy Cyber-Attack Design Using Dynamic Programming
    Anandl, Sribalaji C.
    Teixeira, Andre M. H.
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3474 - 3479
  • [46] Optimal Linear Cyber-Attack on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2017, 4 (01): : 4 - 13
  • [47] Cyber-Attack Event Analysis for EV Charging Stations
    Girdhar, Mansi
    Hong, Junho
    You, Yongsik
    Song, Tai-jin
    Govindarasu, Manimaran
    2023 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, PESGM, 2023,
  • [48] Predicting Malicious Intention in CPS under Cyber-Attack
    Bezzo, Nicola
    2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, : 351 - 352
  • [49] A Stealth Cyber-Attack Detection Strategy for DC Microgrids
    Sahoo, Subham
    Mishra, Sukumar
    Peng, Jimmy Chih-Hsien
    Dragicevic, Tomislav
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2019, 34 (08) : 8162 - 8174
  • [50] The Enemy Within: The Challenge for Business from Cyber-attack
    Reynolds, Michael
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 123 - 136