Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 67, 2023 - Issue 5
514
Views
0
CrossRef citations to date
0
Altmetric
Research Article

HUMAN FACTORS SECURITY ENGINEERING: THE FUTURE OF CYBERSECURITY TEAMS

REFERENCES

  • Abawajy, J. (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), 237–248. https://doi.org/10.1080/0144929X.2012.708787
  • APA. ( n.d.a.). APA dictionary of psychology. Retrieved September 20, 2022, n.d.a. https://dictionary.apa.org/cognition
  • APA. ( n.d.b.). APA dictionary of psychology. Retrieved September 20, 2022, n.d.b. https://dictionary.apa.org/cognitive-load
  • APA. ( n.d.c.). APA dictionary of psychology. Retrieved September 20, 2022, n.d.c. https://dictionary.apa.org/perception
  • Cobb, M. J. (2021). Plugging the skills gap: The vital role that women should play in cyber-security. Computer Fraud & Security, 2018(1), 5–8. https://doi.org/10.1016/S1361-3723(18)30004-6
  • Cusak, B., & Adedokun, K. (2018). The impact of personality traits on user’s susceptibility to social engineering attacks. In Proceedings of the 16th Australian Information Security Management Conference, Perth, Australia.
  • Dykstra, J., & Paul, C. L. (2018). Cyber operations stress survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations. In Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, Baltimore, MD.
  • Gelaspie, H. W., & Karwowski, W. (2017). Human factors in information security culture: A literature review. Advances in Intelligent Systems and Computing, 2017(539), 269–280.
  • HFES. (n.d.). About HFES: HFES history. Retrieved September 20, 2022, from https://www.hfes.org/about-hfes/hfes-history
  • IBM. (2021). Cost of a data breach report. Retrieved September 20, 2022, from https://www.ibm.com/security/data-breach
  • Ki-Aries, D., & Faily, S. (2017). Persona-centred information security awareness. Computers & Security, 70(2017), 663–674. https://doi.org/10.1016/j.cose.2017.08.001
  • Kullman, K., Buchanan, L., Komlodi, A., & Engel, D. (2020). Mental model mapping method for cybersecurity. In HCI for Cybersecurity, Privacy, and Trust (Vol. 12210, pp. 458–470).
  • Lahcen, R. A. M., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3(10), 1–18. https://doi.org/10.1186/s42400-020-00050-w
  • Montanez, R., Golob, E., & Xu, S. (2020). Human cognition through the lens of social engineering cyberattacks. Frontiers Psychology, 11(1755), 1–18. https://doi.org/10.3389/fpsyg.2020.01755
  • Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., & Finin, T. (2018). Early detection of cybersecurity threats using collaborative cognition. In Proceedings of the 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA.
  • Nobles, C. (2022). Stress, burnout, and security fatigue in cybersecurity: A human factors problem. Holistica, 13(1), 49–72. https://doi.org/10.2478/hjbpa-2022-0003
  • Ogbanufe, O., & Spears, J. (2019). Burnout in cybersecurity professionals. In Proceedings of the 14th Pre-ICIS Workshop on Information Security and Privacy, Munich, Germany.
  • Parsons, K., McCormac, A., Butavicius, M., & Ferguson, L. (2010). Human factors and information security: Individual, culture and security environment. Defense Technical Information Center.
  • Pham, H. C., Brenna, L., & Furnell, S. (2019). Information security burnout: Identification of sources and mitigating factors from security demands and resources. Journal of Information Security and Applications, 46(2019), 96–107. https://doi.org/10.1016/j.jisa.2019.03.012
  • Radanliev, P., De Roure, D., Nurse, J. R. C., Nicolescu, R., Huth, M., Cannady, S., & Montalvo, R. M. (2018). Integration of cyber security frameworks, models and approaches for building design principles for the Internet-of-Things in Industry 4.0. Living in the Internet of Things: Cybersecurity of the IoT. https://doi.org/10.1049/cp.2018.0041
  • Ros, S., Gonzalez, S., Robles, A., Tobarra, L. L., Caminero, A., & Cano, J. (2020). Analyzing students’ self-perception of success and learning effectiveness using gamification in an online cybersecurity course. Institute of Electrical and Electronics EngineersAccess, 8, 1–11. https://doi.org/10.1109/ACCESS.2020.2996361
  • Salvendy, G. (Ed.). (2012). Handbook of human factors and ergonomics. John Wiley & Sons, Inc.
  • Siu, K., Moitra, A., Li, M., Durling, M., Herencia-Zapana, H., Interrante, J., Meng, B., Tinelli, C., Chowdhury, O., Larraz, D., Yahyazadeh, M., Arif, M. F., & Prince, D. (2019). Architectural and behavioral analysis for cyber security. In Proceedings of the 2019 IEEE/AIAA 38th Digital Avionics Systems Conference (DASC), https://doi.org/10.1109/DASC43569.2019.9081652
  • Vanderbilt University. (n.d.). Unconscious bias. Retrieved September 20, 2022, from https://www.vanderbilt.edu/diversity/unconscious-bias/
  • Xu, H., & Mahenthiran, S. (2021). Users’ perception of cybersecurity, trust and cloud computing providers’ performance. Information and Computer Security, 29(5), 816–835. https://doi.org/10.1108/ICS-09-2020-0153

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.