BackgroundThe number of reported public sector information security incidents has significantly increased recently including 22% related to the UK health sector. Over two thirds of these incidents pertain to human error, but despite this, there are limited published related works researching human error as it affects information security.MethodThis research conducts an empirical case study into the feasibility and implementation of the Information Security Core Human Error Causes (IS-CHEC) technique which is an information security adaptation of Human Error Assessment and Reduction Technique (HEART). We analysed 12 months of reported information security incidents for a participating public sector organisation providing healthcare services ...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
The goal of this thesis is to analyze and compare the effects of human error on cybersecurity within...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
BackgroundThe number of reported public sector information security incidents has significantly incr...
The file attached to this record is the author's final peer reviewed version.Background The number ...
It is reported in the literature that the human being is the weakest link with regard to information...
Information security recognised the human as the weakest link. Despite numerous international or se...
Information security recognised the human as the weakest link. Despite numerous international or sec...
Information security recognised the human as the weakest link. Despite numerous international or sec...
open accessThe objective of the research was to establish data relating to underlying causes of huma...
The objective of the research was to establish data relating to underlying causes of human error whi...
Organisations continue to suffer information security incidents and breaches as a result of human er...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The information security field experiences a continuous stream of information security incidents and...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
The goal of this thesis is to analyze and compare the effects of human error on cybersecurity within...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...
BackgroundThe number of reported public sector information security incidents has significantly incr...
The file attached to this record is the author's final peer reviewed version.Background The number ...
It is reported in the literature that the human being is the weakest link with regard to information...
Information security recognised the human as the weakest link. Despite numerous international or se...
Information security recognised the human as the weakest link. Despite numerous international or sec...
Information security recognised the human as the weakest link. Despite numerous international or sec...
open accessThe objective of the research was to establish data relating to underlying causes of huma...
The objective of the research was to establish data relating to underlying causes of human error whi...
Organisations continue to suffer information security incidents and breaches as a result of human er...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The information security field experiences a continuous stream of information security incidents and...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
The goal of this thesis is to analyze and compare the effects of human error on cybersecurity within...
The authors gratefully acknowledge the assistance of Edward Chang in data collection and coding of t...