Users’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior
Woods, N. (2022). Users’ Psychopathologies : Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 93-134). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_5
Julkaistu sarjassa
Computational Methods in Applied SciencesTekijät
Päivämäärä
2022Oppiaine
Empirical Cyber Security and Software EngineeringTietojärjestelmätiedeKyberturvallisuusEmpirical Cyber Security and Software EngineeringInformation Systems ScienceCyber securityTekijänoikeudet
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
The internet and digital technologies have become an integral part of people’s daily lives. The online world provides many benefits to billions of users globally. However, it also brings risks too, because it is easy for criminals to reach their victims and exploit their online behavior. Nevertheless, users often perform risky security behaviors for convenience and usability, and because of their inadequate security awareness. With around 25% of the world’s population experiencing mental and/or neurological disorders, it is important to understand how users’ psychopathologies manifest themselves in the context of cybersecurity. This chapter has reviewed the symptoms of several mental disorders while considering the online benefits and risks, and these symptoms have been applied to evaluate users’ vulnerability to cybercrimes and cybersecurity practices. The findings reveal how the complexity of each mental disorder influences users’ online engagement and susceptibility to cybercrimes, and how uniquely, to varying degrees, they affect different cybersecurity behaviors.
...
Julkaisija
SpringerEmojulkaisun ISBN
978-3-030-91292-5Kuuluu julkaisuun
Cyber Security : Critical Infrastructure ProtectionISSN Hae Julkaisufoorumista
1871-3033Asiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/117612954
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime
Rauhala, Juhani; Tyrväinen, Pasi; Zaidenberg, Nezer (IGI Global, 2020)The internet is used increasingly as a platform both for free expression and e-commerce. The internet has unique security and privacy risks. Such risks include the threat of criminal cyberattacks, including hacking and ... -
A View on Vulnerabilities Within IoT Devices in the Smart Home Environment
Nykänen, Annika; Costin, Andrei (Springer Nature Switzerland, 2023)The number of different devices connected to the Internet is constantly increasing. There is a high demand for these devices, and their benefits are clear for certain groups of users. Some of these devices, the Internet ... -
Smart Terminal System of Systems’ Cyber Threat Impact Evaluation
Simola, Jussi; Pöyhönen, Jouni; Lehto, Martti (Academic Conferences International, 2023)Systems of system-level thinking is required when the purpose is to develop a coherent understanding of the ecosystem where every user and system requirements are divided into specific parts. The smarter project, as a part ... -
Can Mental Health Affect InfoSec Behavior?
Woods, Naomi; Paananen, Hanna (Association for Information Systems, 2024)Organizations have significant financial losses every year due to insider threats. These are caused by employees’ malicious or accidentally weak information security (infosec) behavior, such as poor password security ... -
Rising cyber threats targeting the banking sector
Keränen, Annu-Maria (2022)Teknologian kehittyminen johtaa uusiin innovaatioihin niin yritysten liiketoiminnassa kuin jokapäiväisessä elämässäkin. Teknologian kehittyessä kehittyvät myös kyberuhat. Pankkisektori kuuluu yhteiskunnan kriittiseen ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.