Jun 27, 2021 | Conference proceedings, Research library
The Capability-Opportunity-Motivation-Behavior (COM-B) model posits that individuals’ behavior can be understood by considering their capabilities, opportunities, motivation, and the interplay among these factors. This research aims to apply the COM-B model to...
Jun 18, 2021 | Research library
Human factor is widely recognized as the first threat to the security of information systems (ISS). ISS research thus points to the problem of user behavior, which is overwhelmingly represented as a fallibility that would be part of its nature. Companies would...
Jun 11, 2021 | Research library
Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users’ cognitive...
Jun 5, 2021 | Journal article, Research library
Despite substantial investments in technological solutions to bolster cybersecurity, human factors, such as employees falling for phishing attacks, remain a significant vulnerability that can undermine even the most advanced security systems. Drawing upon dual-process...
May 18, 2021 | Research library
Although the pandemic is certainly not the first occurrence of socially disruptive circumstances that drive cyber criminals to action, relevant academic scholarship has remained scarce. To fill this gap in literature, and propose the analytical framework of...
May 6, 2021 | Research library
The questions this project addressed include: How is social engineering used to deploy malware? What is the economic impact of successful malware/ransomware attacks? What security measures can be implemented to help mitigate these attacks? This research focuses on...