Open Access Open Access  Restricted Access Subscription or Fee Access

Human Psychological Factors Affecting Software Engineering Discipline from Cybersecurity Prospective

Bhawani Shanker, Amina Tufail, Gulshan Kumar, Ahthasham Sajid, Rida Malik

Abstract


Research into information security has long been an established subfield within the broader academic communities of computer science, software engineering, and information and communications technology. Over the past few years, “cyber security” has largely supplanted the older phrase “information security”. Cyber security refers to the protection of data and computer networks.This paper aims to demonstrate that studies in behavioral sciences focusing on user behavior, in addition to studies in computer science, can offer crucial techniques to help improve cyber security and mitigate the effects of social engineering and cognitive hacking (i.e., spreading false information) employed by cybercriminals. These techniques can help improve cyber security and enhance cyber safety. This will be completed by showing that behavioral sciences could give vital approaches that help in increasing cyber security and improving user behavior. This will be accomplished by demonstrating that behavioral sciences can offer critical strategies. Consequently, in this body of work, we investigate the most recent findings from research on the psychological characteristics and individual characteristics of computer system users that explain vulnerability to breaches in online security and criminal activity. We zero in on the elements responsible for susceptibility.


Full Text:

PDF

References


G. Penchev, “Planning and Implementing Change in Cyber Security Network Organisations,” Information & Security: An International Journal, vol. 50, no. 1, pp. 89–101, 2021, doi: https://doi.org/10.11610/isij.5008

M. Lehto, “The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies,” International Journal of Cyber Warfare and Terrorism, vol. 3, no. 3, pp. 1–18, Jul. 2019, DOI https://doi.org/10.4018/ijcwt.2013070101.

“Article summaries,” Computer, vol. 35, no. 8, pp. 19–19, Aug. 2002, doi: https://doi.org/10.1109/mc.2002.1023782.

Tech slang, “What is Cognitive Hacking? — Techslang,” Techslang — Tech Explained in Simple Terms, Nov. 21, 2022. https://www.techslang.com/definition/what-is-cognitive-hacking/

M. B. Huer, “Acquisition of Culture From a Developmental Perspective,” Perspectives on Neurophysiology and Neurogenic Speech and Language Disorders, vol. 15, no. 1, pp. 7–15, Apr. 2005, doi: https://doi.org/10.1044/nnsld15.1.7.

Karen S. Rommelfanger et al., “Neuroethics Questions to Guide Ethical Research in the International Brain Initiatives,” Neuron, vol. 100, no. 1, pp. 19–36, Oct. 2018, doi: https://doi.org/10.1016/j.neuron.2018.09.021.

P. Liu, S. Jajodia, and C. Wang, Theory and models for cyber situation awareness. Cham, Switzerland: Springer, 2017.

E. J. M. Colbert and A. Kott, Cyber-security of SCADA and Other Industrial Control Systems. Cham Springer International Publishing, 2016

Pierangela Samarati, I. Ray, I. Ray, and SpringerLink (Online Service, From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Cham: Springer International Publishing, 2018.

M. Maasberg, C. Van Slyke, S. Ellis, and N. Beebe, “The dark triad and insider threats in cyber security,” Communications of the ACM, vol. 63, no. 12, pp. 64–80, Nov. 2020, doi: https://doi.org/10.1145/3408864.

Harrison, J. Summers, and B. Mennecke, “The Effects of the Dark Triad on Unethical Behavior,” Journal of Business Ethics, vol. 153, no. 1, pp. 53–77, Oct. 2016, doi: https://doi.org/10.1007/s10551-016-3368-3.

S. Furnell and N. Clarke, “Power to the people? The evolving recognition of human aspects of security,” Computers & Security, vol. 31, no. 8, pp. 983–988, Nov. 2012, doi: https://doi.org/10.1016/j.cose.2012.08.004.

Djenna, S. Harous, and D. E. Saidouni, "Internet of Things Meet the Internet of Threats: New Concern Cyber Security Issues of Critical Cyber Infrastructure," Applied Sciences, vol. 11, no. 10, p. 4580, May 2021, doi https://doi.org/10.3390/app11104580.

M. Christen, B. Gordijn, and M. Loi, “The Ethics of Cybersecurity,” CrimRxiv, Mar. 2022, doi: https://doi.org/10.21428/cb6ab371.d27262ff.

Z. M. Hakim et al., “The Phishing Email Suspicion Test (PEST) a lab-based task for evaluating the cognitive mechanisms of phishing detection,” Behavior Research Methods, Oct. 2020, doi: https://doi.org/10.3758/s13428-020-01495-0.

K. Parsons, M. Butavicius, P. Delfabbro, and M. Lillie, “Predicting susceptibility to social influence in phishing emails,” International Journal of Human-Computer Studies, vol. 128, pp. 17–26, Aug. 2019, doi: https://doi.org/10.1016/j.ijhcs.2019.02.007.

E. K. Perrault, “Using an Interactive Online Quiz to Recalibrate College Students’ Attitudes and Behavioral Intentions About Phishing,” Journal of Educational Computing Research, vol. 55, no. 8, pp. 1154–1167, Mar. 2017, doi: https://doi.org/10.1177/0735633117699232.

J. A. Chaudhry, S. A. Chaudhry, and R. G. Rittenhouse, “Phishing Attacks and Defenses,” International Journal of Security and Its Applications, vol. 10, no. 1, pp. 247–256, Jan. 2016, doi: https://doi.org/10.14257/ijsia.2016.10.1.23.

T. Herath and H. R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organizations," European Journal of Information Systems, vol. 18, no. 2, pp. 106–125, Apr. 2009, doi: https://doi.org/10.1057/ejis.2009.6.

O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Systems with Applications, vol. 117, pp. 345–357, Mar. 2019, DOI https://doi.org/10.1016/j.eswa.2018.09.029.

O. K. Sahingoz, E. Buber, O. Demir, and B. Diri, “Machine learning based phishing detection from URLs,” Expert Systems with Applications, vol. 117, pp. 345–357, Mar. 2019, DOI https://doi.org/10.1016/j.eswa.2018.09.029.

M. Wenzel and M. G. Will, “The communicative constitution of academic fields in the digital age: The case of CSR,” Technological Forecasting and Social Change, vol. 146, pp. 517–533, Sep. 2019, DOI https://doi.org/10.1016/j.techfore.2019.05.006.

P. van Schaik, D. Jeske, J. Onibokun, L. Coventry, J. Jansen, and P. Kusev, “Risk perceptions of cyber-security and precautionary behavior,” Computers in Human Behavior, vol. 75, pp. 547–559, Oct. 2017, doi: https://doi.org/10.1016/j.chb.2017.05.038.

K. Quinn, D. Epstein, and B. Moon, “We Care About Different Things: Non-Elite Conceptualizations of Social Media Privacy,” Social Media + Society, vol. 5, no. 3, p. 205630511986600, Jul. 2019, doi: https://doi.org/10.1177/2056305119866008.

Nikoletta Bódi et al., “Reward-learning and the novelty-seeking personality: a between- and within-subjects study of the effects of dopamine agonists on young Parkinson’s patients,” Brain, vol. 132, no. 9, pp. 2385–2395, Sep. 2009, doi: https://doi.org/10.1093/brain/awp094.

L. Hadlington, “Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviors,” Heliyon, vol. 3, no. 7, p. e00346, Jul. 2017, doi: https://doi.org/10.1016/j.heliyon.2017.e00346

U. Bromberg, M. Lobatcheva, and J. Peters, “Episodic future thinking reduces temporal discounting in healthy adolescents,” PLOS ONE, vol. 12, no. 11, p. e0188079, Nov. 2017, doi: https://doi.org/10.1371/journal.pone.0188079.


Refbacks

  • There are currently no refbacks.