Information security recognised the human as the weakest link. Despite numerous international or sector-specific standards and frameworks, the information security community has not yet adopted formal mechanisms to manage human errors that cause information security breaches. Such techniques have been however established within the safety field where human reliability analysis (HRA) techniques are widely applied. In previous work we developed Information Security Core Human Error Causes (IS-CHEC) to fill this gap. This case study presents empirical research that uses IS-CHEC over a 12 month period within two participating public and private sector organisations in order to observe and understand how the implementation of the IS-CHEC infor...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
Today there are many hardware and software solutions to enhance information security, but there is l...
Information security recognised the human as the weakest link. Despite numerous international or sec...
Information security recognised the human as the weakest link. Despite numerous international or sec...
It is reported in the literature that the human being is the weakest link with regard to information...
BackgroundThe number of reported public sector information security incidents has significantly incr...
The file attached to this record is the author's final peer reviewed version.Background The number ...
open accessThe objective of the research was to establish data relating to underlying causes of huma...
The information security field experiences a continuous stream of information security incidents and...
The objective of the research was to establish data relating to underlying causes of human error whi...
Organisations continue to suffer information security incidents and breaches as a result of human er...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
Today there are many hardware and software solutions to enhance information security, but there is l...
Information security recognised the human as the weakest link. Despite numerous international or sec...
Information security recognised the human as the weakest link. Despite numerous international or sec...
It is reported in the literature that the human being is the weakest link with regard to information...
BackgroundThe number of reported public sector information security incidents has significantly incr...
The file attached to this record is the author's final peer reviewed version.Background The number ...
open accessThe objective of the research was to establish data relating to underlying causes of huma...
The information security field experiences a continuous stream of information security incidents and...
The objective of the research was to establish data relating to underlying causes of human error whi...
Organisations continue to suffer information security incidents and breaches as a result of human er...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
Today there are many hardware and software solutions to enhance information security, but there is l...