Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the exposure of private and sensitive data. The root causes for such incidents are rarely complex attacks. Instead, the attacks are straight-forward, and they are enabled by simple misconfigurations, such as authentication not being required, or security updates not being installed. For example, the leak of over 140 million Americans’ private data from Equifax’s systems ranks among most severe misconfigurations in recent history: The underlying vulnerability was long known, and a security patch had been readily available for months, but it was never applied. Ultimately, Equifax blamed an employee for forgetting to update the affected system, highlight...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
With the increasing number and severity of security incidents and exploits, information technology (...
Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the expos...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
Purpose - This paper aims to assess the influence of a set of human and organizational factors in in...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
The human and organisational factors contributing to information security are still poorly understoo...
SCADA systems have been successfully implemented in industries like oil, gas and electricity for mai...
Information security breaches is a current serious issue that has been faced by many organizations. ...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
Traditionally, security is only considered as strong as its weakest link, and people were considered...
Inspired by the root cause analysis techniques that in the field of safety research and practice hel...
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made pos...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
With the increasing number and severity of security incidents and exploits, information technology (...
Nowadays, security incidents have become a familiar “nuisance,” and they regularly lead to the expos...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
This paper analyses security problems of modern computer systems caused by vulnerabilities in their ...
Purpose - This paper aims to assess the influence of a set of human and organizational factors in in...
Information security breaches and privacy violations are major concerns for many organisations. Huma...
The human and organisational factors contributing to information security are still poorly understoo...
SCADA systems have been successfully implemented in industries like oil, gas and electricity for mai...
Information security breaches is a current serious issue that has been faced by many organizations. ...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
Traditionally, security is only considered as strong as its weakest link, and people were considered...
Inspired by the root cause analysis techniques that in the field of safety research and practice hel...
Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made pos...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
Security is a focus in many systems that are developed today, yet this aspect of systems development...
With the increasing number and severity of security incidents and exploits, information technology (...