2015
DOI: 10.1016/j.promfg.2015.07.178
|View full text |Cite
|
Sign up to set email alerts
|

How Management Goes Wrong? – The Human Factor Lessons Learned from a Cyber Incident Handling Exercise

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Historically, CIS has usually been approached adopting a technology-centric viewpoint, with little – if no – consideration and understanding of the end users’ cognitive processes, needs and motivations (Abawajy 2014 ; Aoyama et al 2015 ; Glaspie 2018 ; Lahcen et al 2018 ). As a consequence, organisations have given great emphasis to technological solutions (e.g., firewalls, antivirus software, and intrusion detection systems) to tackle potential cyber threats (Abawajy 2014 ; Aoyama et al 2015 ; Mouton et al 2016 ; Segovia et al 2017 ). The recent research in cybersecurity widely agrees that a holistic approach as opposed to technical solutions alone is required to contrast cyber-attacks (Al-Darwish and Choe 2019; Bansal et al 2010 ; Corradini, 2020 ; Jeong et al 2019; Eminağaoğlu et al 2009 ).…”
Section: Introductionmentioning
confidence: 99%
“…Historically, CIS has usually been approached adopting a technology-centric viewpoint, with little – if no – consideration and understanding of the end users’ cognitive processes, needs and motivations (Abawajy 2014 ; Aoyama et al 2015 ; Glaspie 2018 ; Lahcen et al 2018 ). As a consequence, organisations have given great emphasis to technological solutions (e.g., firewalls, antivirus software, and intrusion detection systems) to tackle potential cyber threats (Abawajy 2014 ; Aoyama et al 2015 ; Mouton et al 2016 ; Segovia et al 2017 ). The recent research in cybersecurity widely agrees that a holistic approach as opposed to technical solutions alone is required to contrast cyber-attacks (Al-Darwish and Choe 2019; Bansal et al 2010 ; Corradini, 2020 ; Jeong et al 2019; Eminağaoğlu et al 2009 ).…”
Section: Introductionmentioning
confidence: 99%
“…Due to its low cost, most training courses are designed to improve employees' security awareness and reduce human errors. Aoyama et al summarized that most teams have experienced similar management challenges, and the management challenges observed in incident handling training are possible challenges in real-world cyber incident management [12]. The demand for SETA implementation in industries is increasing, and some authoritative organizations are providing training in cyber incident handling.…”
Section: Difficulties In Seta Implementationmentioning
confidence: 99%