Breaches of cyber-security often arise unintentionally from the human user such as when switching between subtasks or external interruptions, disrupting the flow of work and leading to action slips in the execution of a task procedure [1, 2]. There has been little research into the perceived effects of task interruption and switching on computer-based tasks when such action slips can potentially compromise information security. Semi-structured interviews were conducted on nine university employees who regularly handle sensitive information, designed to identify which features of information-sensitive computer-based tasks are the most susceptible to disruption. Potential sources of human error in were identified with task interruption judged...
(1) Background: Work-related stress is a major contributor to human error. One significant workplace...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
Breaches of cyber-security often arise unintentionally from the human user such as when switching be...
User errors while performing security-critical tasks can lead to undesirable or even disastrous cons...
The aim of the present study was twofold. First it aimed to elicit Information Security (InfoSec) ex...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
BackgroundThe number of reported public sector information security incidents has significantly incr...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
Over recent decades, we have moved our workflows, record management, and communications into digital...
It is reported in the literature that the human being is the weakest link with regard to information...
Information security recognised the human as the weakest link. Despite numerous international or se...
Abstract: In the technology-people-management chain, people are predominantly identified as the weak...
International audienceIt was recognized long ago by Seneca through his famous "errare humanum est." ...
Knowledge workers experience many interruptions during their work day. Especially when they happen a...
(1) Background: Work-related stress is a major contributor to human error. One significant workplace...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...
Breaches of cyber-security often arise unintentionally from the human user such as when switching be...
User errors while performing security-critical tasks can lead to undesirable or even disastrous cons...
The aim of the present study was twofold. First it aimed to elicit Information Security (InfoSec) ex...
Information security (InfoSec) is concerned with protecting the confidentially, integrity and availa...
BackgroundThe number of reported public sector information security incidents has significantly incr...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
Over recent decades, we have moved our workflows, record management, and communications into digital...
It is reported in the literature that the human being is the weakest link with regard to information...
Information security recognised the human as the weakest link. Despite numerous international or se...
Abstract: In the technology-people-management chain, people are predominantly identified as the weak...
International audienceIt was recognized long ago by Seneca through his famous "errare humanum est." ...
Knowledge workers experience many interruptions during their work day. Especially when they happen a...
(1) Background: Work-related stress is a major contributor to human error. One significant workplace...
Information Systems (IS) are critical for employee productivity and organizational success. Data bre...
In the past decade, the world has experienced numerous severe and impactful data breaches, without i...