2019
DOI: 10.1016/j.jisa.2019.06.008
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive security: A comprehensive study of cognitive science in cybersecurity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 53 publications
(33 citation statements)
references
References 18 publications
0
33
0
Order By: Relevance
“…The first phase at a strategic level that the smart city must raise is to develop a cybersecurity situational awareness that allows it to know the strengths and weaknesses concerning the different factors that may affect its cybersecurity. Considering that one of the limitations is the technological factor and that the technological pillar in the development of the smart city is IoT, in what follows, we establish the cybersecurity situation awareness of this technology [83].…”
Section: Results Of the Analysis Of The Selected Papersmentioning
confidence: 99%
“…The first phase at a strategic level that the smart city must raise is to develop a cybersecurity situational awareness that allows it to know the strengths and weaknesses concerning the different factors that may affect its cybersecurity. Considering that one of the limitations is the technological factor and that the technological pillar in the development of the smart city is IoT, in what follows, we establish the cybersecurity situation awareness of this technology [83].…”
Section: Results Of the Analysis Of The Selected Papersmentioning
confidence: 99%
“…One report estimated that 95% of cyber and network attacks are due to human errors (Nobles, 2018). In our context, humans are either computer system users or security analysts (King et al, 2018;Andrade and Yoo, 2019), though most research on this area focuses on errors done by computer system users. According to Ifinedo (2014), company employees are the weakest link in ensuring system security (for discussion and analysis, also see Sasse et al, 2004;Vroom and von Solms, 2004;Stanton et al, 2005;Guo et al, 2011).…”
Section: Human Cyber Security Errorsmentioning
confidence: 99%
“…The aim of this finding is to avoid maximum risk and develop potential risk solutions. Roberto et al [19] Current social change is created by IoT, cloud computing, smartphones and social networks. This technological transformation however results in new threats and security attacks that create new and complex cyber security scenarios with large amounts of data and vectors of attack overcoming cognitive capabilities of security analysts.…”
Section: Cloud Computing Based Machine Learning Systems For Cybersecuritymentioning
confidence: 99%