2016
DOI: 10.1108/ics-01-2016-0006
|View full text |Cite
|
Sign up to set email alerts
|

An information security risk-driven investment model for analysing human factors

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
28
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 21 publications
1
28
0
Order By: Relevance
“…Research revealed that 80-90% of security breaches are due to humanenabled errors in the U.S. and U.K. (Maglaras, He, Janicke, & Evans, 2016) which these two countries account for over 90% of reported data breaches (Wirth, 2017). The evolving changes and threats in the cyber landscape are progressing; consequently, requiring organizations to develop holistic and dynamic information security strategies to eradicate and mitigate threats and vulnerabilities (Alavi, Islam, & Mouratidis, 2016). Even with the influx of technological capabilities coupled with operational, administrative, and technical countermeasures; there is a continuity of failure to address human factors concerns in information security, which enables the proliferation of data breaches, ransom attacks, and social engineering attacks at unprecedented levels.…”
Section: Cybersecurity Threat Landscapementioning
confidence: 99%
See 3 more Smart Citations
“…Research revealed that 80-90% of security breaches are due to humanenabled errors in the U.S. and U.K. (Maglaras, He, Janicke, & Evans, 2016) which these two countries account for over 90% of reported data breaches (Wirth, 2017). The evolving changes and threats in the cyber landscape are progressing; consequently, requiring organizations to develop holistic and dynamic information security strategies to eradicate and mitigate threats and vulnerabilities (Alavi, Islam, & Mouratidis, 2016). Even with the influx of technological capabilities coupled with operational, administrative, and technical countermeasures; there is a continuity of failure to address human factors concerns in information security, which enables the proliferation of data breaches, ransom attacks, and social engineering attacks at unprecedented levels.…”
Section: Cybersecurity Threat Landscapementioning
confidence: 99%
“…A 2015 report indicates that Wells Fargo, Bank of America, Citibank, and J. P. Morgan Chase invested 1.5 billion dollars in mitigating emerging and persistent cyber threats (Morgan, 2016). Humans are notably the weakest link in security and risk management (Alavi, Islam, & Mouratidis, 2016;Proctor & Chen, 2015) because organizations struggle to understand and mitigate behavioral-based risk in information security. Human factors are the study of human interaction with information systems, networks, and practices in an information security environment (Nobles, 2015).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A further cost-focused and business economical focused approach is presented by [40] who resort to a meta-discussion of involved human factors in deriving various business economical figures related to security aspects. Unfortunately, what is yet missing in approach is a clear mathematical formalization of underlying mathematical problems and a formalized description to apply their derived cost metrics to an IT security scenario.…”
Section: Related Workmentioning
confidence: 99%