In this opinion paper, we first review the evolution of information security research, and summarize it as three waves of information security evolution: the first wave is technology-centric, which aimed to create technical artifacts of information security; the second wave is economics-centric, which aimed to design economic mechanisms to incentivize users\u27 optimal information security behaviors; and the emerging third wave which is human-centric. In this wave, the focal point of interest is human decision making in information security scenarios, and a wide variety of factors that would influence human decision making in reality are incorporated in the study of human-centric information security. Based on this understanding, we propose...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Most current information systems security theories assume a rational actor making deliberate decisio...
In this paper the historically persistent mismatch between the information systems development and s...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
Cyber-security has recently become a topic of interest in behavioral economics, following nascent aw...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
In security science, efficient operation depends typically on the interaction between technology, hu...
Today there are many hardware and software solutions to enhance information security, but there is l...
Starting in the mid of the 20th century, the emergence of contemporary information technologies has...
The aim of the thesis is to investigate the relationship between human behaviour and effective secur...
The human-centred security research area came into being about fifteen years ago, as more and more p...
The creation and adoption of connectivity-, sensor-, and actuator-rich emerging tech-nologies alter ...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Most current information systems security theories assume a rational actor making deliberate decisio...
In this paper the historically persistent mismatch between the information systems development and s...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
Cyber-security has recently become a topic of interest in behavioral economics, following nascent aw...
Despite the vast research in Information Security, the human factor has been found to lack interest ...
International audienceSecurity information sharing (SIS) is an activity whereby individuals exchange...
In security science, efficient operation depends typically on the interaction between technology, hu...
Today there are many hardware and software solutions to enhance information security, but there is l...
Starting in the mid of the 20th century, the emergence of contemporary information technologies has...
The aim of the thesis is to investigate the relationship between human behaviour and effective secur...
The human-centred security research area came into being about fifteen years ago, as more and more p...
The creation and adoption of connectivity-, sensor-, and actuator-rich emerging tech-nologies alter ...
Human hacking is a nontechnical kind of intrusion that relies heavily on human manipulation. Its imp...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Most current information systems security theories assume a rational actor making deliberate decisio...