1,123,347 research outputs found

    Human Factors in Information Security

    Get PDF
    It is a well-know fact that there is no unbreakable system in the world. Nowadays, creating secure information system is a big challenge. Besides, it is a desired goal for all IT security managers and engineers in the world. Why is it so hard to create a secure system? One of the answers is human factors

    Aviation Security: The Human Element in Human Factors

    Get PDF
    This article describes aspects of social and political human functioning that are germane to security violations discovered by representatives of the Federal Aviation Agency (FAA) in tests at various United States (U.S.) airports. FAA reports on the violations were obtained by The New York Times through the U.S. Freedom of Information Act and discussed in the Times\u27 January 11th Issue

    Pervasive eHealth services a security and privacy risk awareness survey

    Get PDF
    The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations

    Enhancing the Conventional Information Security Management Maturity Model (ISM3) in Resolving Human Factors in Organization Information Sharing

    Get PDF
    Information sharing in organization has been considered as an important approach in increasing organizational efficiency, performance and decision making. With the present and advances in information and communication technology, sharing information and exchanging of data across organizations has become more feasible in organization. However, information sharing has been a complex task over the years and identifying factors that influence information sharing across organization has becomes crucial and critical. Researchers have taken several methods and approaches to resolve problems in information sharing at all levels without a lasting solution, as sharing is best understood as a practice that reflects behavior, social, economic, legal and technological influences. Due to the limitation of the conventional ISM3 standards to address culture, social, legislation and human behavior, the findings in this paper suggest that, a centralized information structure without human practice, distribution of information and coordination is not effective. This paper reviews the previous information sharing research, outlines the factors affecting information sharing and the different practices needed to improve the management of information security by recommending several combinations of information security and coordination mechanism for reducing uncertainty during sharing of information .This thesis proposes information security management protocol (ISMP) as an enhancement towards ISM3 to resolve the above problems. This protocol provides a means for practitioners to identify key factors involved in successful information sharing....

    Usable Security: Why Do We Need It? How Do We Get It?

    Get PDF
    Security experts frequently refer to people as “the weakest link in the chain” of system security. Famed hacker Kevin Mitnick revealed that he hardly ever cracked a password, because it “was easier to dupe people into revealing it” by employing a range of social engineering techniques. Often, such failures are attributed to users’ carelessness and ignorance. However, more enlightened researchers have pointed out that current security tools are simply too complex for many users, and they have made efforts to improve user interfaces to security tools. In this chapter, we aim to broaden the current perspective, focusing on the usability of security tools (or products) and the process of designing secure systems for the real-world context (the panorama) in which they have to operate. Here we demonstrate how current human factors knowledge and user-centered design principles can help security designers produce security solutions that are effective in practice

    How is the EUSECON Project Shaping the European Security Research Agenda?

    Get PDF
    The New Agenda for European Security Economics (EUSECON) is a project that, since 2008, explores the challenges and opportunities in research on human-induced security risks. After defining security as a good that has both public and private characteristics, the research focuses on different elements within the wider issue. The research addresses the factors that influence agents of insecurity and the responses triggered by insecurity threats and security policies. Underpinned by research, the project presents its policy-relevant findings with the goal of improving policy-making in the European Union, disseminating this knowledge to stakeholders, and of promoting information exchange.
    corecore