Academic literature on the topic 'Human aspects of cyber security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Human aspects of cyber security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Human aspects of cyber security"
Begishev, I. R. "Cyber-Security Culture: Psychological and Legal Aspects." Psychology and Law 11, no. 4 (2021): 207–20. http://dx.doi.org/10.17759/psylaw.2021110415.
Full textR., Moinescu. "Aspects of human weaknesses in cyber security." Scientific Bulletin of Naval Academy XXII, no. 1 (July 15, 2019): 163–70. http://dx.doi.org/10.21279/1454-864x-19-i1-022.
Full textNel, Frans, and Lynette Drevin. "Key elements of an information security culture in organisations." Information & Computer Security 27, no. 2 (June 12, 2019): 146–64. http://dx.doi.org/10.1108/ics-12-2016-0095.
Full textPattinson, Malcolm, Marcus Butavicius, Meredith Lillie, Beau Ciccarello, Kathryn Parsons, Dragana Calic, and Agata McCormac. "Matching training to individual learning styles improves information security awareness." Information & Computer Security 28, no. 1 (November 11, 2019): 1–14. http://dx.doi.org/10.1108/ics-01-2019-0022.
Full textQuader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.
Full textVieane, Alex, Gregory Funke, Robert Gutzwiller, Vincent Mancuso, Ben Sawyer, and Christopher Wickens. "Addressing Human Factors Gaps in Cyber Defense." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 770–73. http://dx.doi.org/10.1177/1541931213601176.
Full textBalaganesh, Duraisamy. "Future of Secure Remote Workforce Perspective - What’s Next?" IRO Journal on Sustainable Wireless Systems 4, no. 3 (September 5, 2022): 149–61. http://dx.doi.org/10.36548/jsws.2022.3.002.
Full textSebestyen, Gheorghe, and Anca Hangan. "Anomaly detection techniques in cyber-physical systems." Acta Universitatis Sapientiae, Informatica 9, no. 2 (December 20, 2017): 101–18. http://dx.doi.org/10.1515/ausi-2017-0007.
Full textHorbachenko, S. "Cyber security as a component of economic security of Ukraine." Galic'kij ekonomičnij visnik 66, no. 5 (2020): 180–86. http://dx.doi.org/10.33108/galicianvisnyk_tntu2020.05.180.
Full textFausett, Crystal M., and Joseph R. Keebler. "Shift Happens: Human Factors Considerations for Handoffs in Cyber-Security Operations Centers." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 66, no. 1 (September 2022): 110–14. http://dx.doi.org/10.1177/1071181322661131.
Full textDissertations / Theses on the topic "Human aspects of cyber security"
Afzal, Muhammad. "Human and Organizational Aspects of Cyber Security : From a System Suppliers Perspective." Thesis, KTH, Industriella informations- och styrsystem, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-105778.
Full textGopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.
Full textJung, Sung-Oh. "A quantitative man-machine model for cyber security efficiency analysis." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4851.
Full textAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Full textSanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.
Full textPh. D.
Enhancing the efficiency, sustainability, and resilience of cities, infrastructure, and industrial systems is contingent on their transformation into more interactive and interconnected smart systems. This has led to the emergence of what is known as cyber-physical systems (CPSs). CPSs are widescale distributed and interconnected systems integrating physical components and humans via a cyber layer that enables sensing, connectivity, and data processing. Some of the most prominent examples of CPSs include the smart electric grid, smart cities, intelligent transportation systems, and the Internet of Things. The seamless interconnectivity between the various elements of a CPS introduces a wealth of operational benefits. However, this wide-scale interconnectivity and ubiquitous integration of cyber technologies render CPSs vulnerable to a range of security threats as manifested by recently reported security breaches in a number of CPS application domains. Addressing these culminating security challenges requires the development and implementation of fool-proof defense strategies grounded in solid theoretical foundations. To this end, the central goal of this dissertation is to enhance the security of CPSs by advancing novel analytical frameworks which tightly integrate the cyber, physical, and human elements of a CPS. The developed frameworks and tools enable the derivation of holistic defense strategies by: a) Characterizing the security interdependence between the various elements of a CPS, b) Quantifying the consequences of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, c) Modeling the multi-agent interactions in CPSs, involving humans and automated systems, which have a direct effect on the security state of the system, and d) Capturing the role that human perceptions and decision making processes play in the security of CPSs. The developed tools and performed analyses integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models and introduce key contributions to a number of CPS application domains such as the smart electric grid and drone systems. The introduced results enable strengthening the security of CPSs, thereby paving the way for their wide-scale adoption in smart cities and critical infrastructure.
Миронець, Оксана Миколаївна, and Tigadi Nageshwar. "Theoretical and legal aspects of human security in the republic of India." Thesis, Київський кооперативний інститут бізнесу і права, 2017. http://er.nau.edu.ua/handle/NAU/35620.
Full textLeppan, Claudette. "Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworks." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/18167.
Full textMunir, Sundas, and Mirza Sanam Iqbal Baig. "Challenges and Security Aspects of Blockchain Based Online Multiplayer Games." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38771.
Full textKirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.
Full textArms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effectiveness of arms embargoes is a specific aim of the United Nations Programme of Action for Preventing and Combating the Illicit Trade in Small Arms and Light Weapons in All Its Aspects1 which specifically calls upon states "To take appropriate measures, including all legal or administrative means, against any activity that violates a United Nations Security Council arms embargo in accordance with the Charter of the United Nations".2 Accordingly, within the context of the implementation of the UN PoA, the overall aim of this paper is to explore ways in which the international community can act in order to strengthen the impact of arms embargoes and enhance human security. It will begin by examining the purposes, processes and effects relating to arms embargoes, with particular attention to those agreed at international (UN) level, and by highlighting issues of concern in each regard. An overview of the main issues and challenges facing implementation of arms embargoes will include the elaboration of three case-study examples showing the impact of UN arms embargoes on the availability of arms and on human security and a further five that illustrate the dilemmas faced by states in seeking to implement arms embargoes. Priority areas for attention in any international effort to strengthen the effectiveness of arms embargoes will be followed by more extensive proposals for enhancing international embargo regimes within the context of implementing the UN PoA. Whilst it is recognised that the UN PoA contains measures that relate only to the illicit trade in small arms and light weapons (SALW), if implemented fully, many of these would serve to strengthen the international apparatus of control, information exchange and provision of assistance relating to arms proliferation and misuse as a whole. In turn, this would greatly enhance the implementation of UN arms embargoes. Therefore, as well as providing an opportunity for reviewing progress on implementing the PoA, the first Biennial Meeting of States in July 2003 is clearly a major opportunity for states to address a number of the pressing challenges facing states in the implementation of UN embargoes.
Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.
Full textInternet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera. En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys. Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
Books on the topic "Human aspects of cyber security"
Kizza, Joseph Migga. Computer network security and cyber ethics. 3rd ed. Jefferson, N.C: McFarland, 2011.
Find full texteditor, Babic Mile, ed. Human security. London: SCM Press, 2018.
Find full textScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Find full textFurnell, Steven, and Nathan Clarke, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2.
Full textClarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2.
Full textClarke, Nathan, and Steven Furnell, eds. Human Aspects of Information Security and Assurance. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8.
Full textKartashkin, V. A. International security and human rights. Moscow: Novosti Press Agency Pub. House, 1988.
Find full textThanh-Đạm, Trương, Wieringa Saskia 1950-, and Chhachhi Amrita, eds. Engendering human security: Feminist perspectives. London: Zed Books, 2006.
Find full textMarinos, Louis, and Ioannis Askoxylakis, eds. Human Aspects of Information Security, Privacy, and Trust. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39345-7.
Full textTryfonas, Theo, ed. Human Aspects of Information Security, Privacy and Trust. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7.
Full textBook chapters on the topic "Human aspects of cyber security"
Ravidas, Dhrisya, Malcolm R. Pattinson, and Paula Oliver. "Cyber Security in Healthcare Organisations." In Human Aspects of Information Security and Assurance, 3–11. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_1.
Full textPerno, Jason, and Christian W. Probst. "Behavioural Profiling in Cyber-Social Systems." In Human Aspects of Information Security, Privacy and Trust, 507–17. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_35.
Full textWall, David S. "Towards a Conceptualisation of Cloud (Cyber) Crime." In Human Aspects of Information Security, Privacy and Trust, 529–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_37.
Full textGlas, Magdalena, Manfred Vielberth, Tobias Reittinger, Fabian Böhm, and Günther Pernul. "Visual Programming in Cyber Range Training to Improve Skill Development." In Human Aspects of Information Security and Assurance, 3–13. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-12172-2_1.
Full textJaffray, Alice, Conor Finn, and Jason R. C. Nurse. "SherLOCKED: A Detective-Themed Serious Game for Cyber Security Education." In Human Aspects of Information Security and Assurance, 35–45. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-81111-2_4.
Full textVasileiou, Ismini. "Cyber Security Education and Training Delivering Industry Relevant Education and Skills via Degree Apprenticeships." In Human Aspects of Information Security and Assurance, 175–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_14.
Full textYuan, Haiyue, Shujun Li, Patrice Rusconi, and Nouf Aljaffan. "When Eye-Tracking Meets Cognitive Modeling: Applications to Cyber Security Systems." In Human Aspects of Information Security, Privacy and Trust, 251–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_17.
Full textFagade, Tesleem, Theo Spyridopoulos, Nabeel Albishry, and Theo Tryfonas. "System Dynamics Approach to Malicious Insider Cyber-Threat Modelling and Analysis." In Human Aspects of Information Security, Privacy and Trust, 309–21. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_21.
Full textBuldas, Ahto, and Märt Saarepera. "Are the Current System Engineering Practices Sufficient to Meet Cyber Crime?" In Human Aspects of Information Security, Privacy and Trust, 451–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_31.
Full textAlotaibi, Mohammed Khaled N. "Employees’ Interest in Professional Advancement on LinkedIn Increases Susceptibility to Cyber-Social Engineering: An Empirical Test." In Human Aspects of Information Security and Assurance, 85–96. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57404-8_7.
Full textConference papers on the topic "Human aspects of cyber security"
Leon Bello, Jorge, and Emilio Gonzalez Viosca. "CARONTE project: Creating an Agenda for Research on Transportation Security." In CIT2016. Congreso de Ingeniería del Transporte. Valencia: Universitat Politècnica València, 2016. http://dx.doi.org/10.4995/cit2016.2016.3272.
Full textMercuri, Ilenia. "Social Engineering and Human-Robot Interactions' Risks." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002199.
Full textKarjalainen, Mika, Tero Kokkonen, and Samir Puuska. "Pedagogical Aspects of Cyber Security Exercises." In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2019. http://dx.doi.org/10.1109/eurospw.2019.00018.
Full textAhmad, Ibtihaj, Muhammad Kaab Zarrar, Takreem Saeed, and Saad Rehman. "Security Aspects of Cyber Physical Systems." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8442009.
Full textGreen, Sam, Ihsan Cicek, and Cetin Kaya Koc. "Continuous-Time Computational Aspects of Cyber-Physical Security." In 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2016. http://dx.doi.org/10.1109/fdtc.2016.19.
Full textBhatia, Nishant Lalitkumar, Vinod Kumar Shukla, Ritu Punhani, and Shish Kumar Dubey. "Growing Aspects of Cyber Security in E-Commerce." In 2021 International Conference on Communication information and Computing Technology (ICCICT). IEEE, 2021. http://dx.doi.org/10.1109/iccict50803.2021.9510152.
Full text"Cyber Security in HSI." In 2019 12th International Conference on Human System Interaction (HSI). IEEE, 2019. http://dx.doi.org/10.1109/hsi47298.2019.8942627.
Full textLeFebvre, Rebecca. "The human element in cyber security." In the 2012 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2390317.2390318.
Full textJones, Simon L., Emily I. M. Collins, Ana Levordashka, Kate Muir, and Adam Joinson. "What is 'Cyber Security'?" In CHI '19: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3290607.3312786.
Full text"2 Cyber Security in HSI." In 2021 14th International Conference on Human System Interaction (HSI). IEEE, 2021. http://dx.doi.org/10.1109/hsi52170.2021.9538651.
Full textReports on the topic "Human aspects of cyber security"
Beiker, Sven. Unsettled Issues in Remote Operation for On-road Driving Automation. SAE International, December 2021. http://dx.doi.org/10.4271/epr2021028.
Full textFrieson, Kate Grace. A Gender Assessment of SEACFMD 2020: A Roadmap to Prevent, Control and Eradicate foot and mouth disease (by 2020) in Southeast Asia and China. O.I.E (World Organisation for Animal Health), December 2013. http://dx.doi.org/10.20506/standz.2785.
Full textCoelho Resende, Noelle, Renata Weber, Jardel Fischer Loeck, Mathias Vaiano Glens, Carolina Gomes, Priscila Farfan Barroso, Janine Targino, Emerson Elias Merhy, Leandro Dominguez Barretto, and Carly Machado. Working Paper Series: Therapeutic Communities in Brazil. Edited by Taniele Rui and Fiore Mauricio. Drugs, Security and Democracy Program, Social Science Research Council, June 2021. http://dx.doi.org/10.35650/ssrc.2081.d.2021.
Full text