Abstract: – Any security system, no matter how well designed and implemented, will have to rely on people. The fact that human factors play a crucial part in the majority of accidents is a troubling feature of modern “security know-how”: We can implement appropriate technical solutions, but we still fail to handle the human factor. Our research project aims at understanding better the role of human factors in information security systems. We develop a system dynamical simulation model to explore the complex security problem. We use a simple, fictitious case to illustrate how system dynamics may deliver insights into the “people security problem ” and help in designing robust security policies. For further progress, collaboration with compa...
The perspective of human factors is largely missing from the wider cyber security dialogue and its s...
In todays world which is full of various technologies and we demand for sophisticated equipment, we ...
In this research relevant areas that are important in Information System Security have been reviewed...
It is a well-know fact that there is no unbreakable system in the world. Nowadays, creating secure ...
The advent of technologies that can seamlessly operate in different environments with differing leve...
Today there are many hardware and software solutions to enhance information security, but there is l...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
In this paper the historically persistent mismatch between the information systems development and s...
In this paper the historically persistent mismatch between the information systems development and s...
The main object of work is the impact of human factor on IS security. The main purpose of this work ...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
The perspective of human factors is largely missing from the wider cyber security dialogue and its s...
In todays world which is full of various technologies and we demand for sophisticated equipment, we ...
In this research relevant areas that are important in Information System Security have been reviewed...
It is a well-know fact that there is no unbreakable system in the world. Nowadays, creating secure ...
The advent of technologies that can seamlessly operate in different environments with differing leve...
Today there are many hardware and software solutions to enhance information security, but there is l...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
Given that Information Technology (IT) has become pervasive in today's organizations, properly secur...
AbstractIt is widely acknowledged that employees of an organization are often a weak link in the pro...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
In this paper the historically persistent mismatch between the information systems development and s...
In this paper the historically persistent mismatch between the information systems development and s...
The main object of work is the impact of human factor on IS security. The main purpose of this work ...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
The perspective of human factors is largely missing from the wider cyber security dialogue and its s...
In todays world which is full of various technologies and we demand for sophisticated equipment, we ...
In this research relevant areas that are important in Information System Security have been reviewed...