Näytä suppeat kuvailutiedot

dc.contributor.authorSoliman, Wael
dc.contributor.authorJärveläinen, Jonna
dc.date.accessioned2024-05-24T12:23:56Z
dc.date.available2024-05-24T12:23:56Z
dc.date.issued2024
dc.identifier.citationSoliman, W., & Järveläinen, J. (2024). Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research. In <i>ECIS 2024 : Proceedings of the 32nd European Conference on Information Systems</i>. Association for Information Systems. <a href="https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/" target="_blank">https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/</a>
dc.identifier.otherCONVID_213555468
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/95186
dc.description.abstractThe use of metaphors is crucial to advancing not only scientific fields but also in facilitating the development of knowledge and understanding in general. While metaphors facilitate the exchange of novel concepts and ideas, they can also be a hindrance if we do not critically question the root metaphors and the extent to which they apply and do not apply to the subjects we study in cybersecurity research. We find two metaphors to be seemingly popular in characterizing the human actor: (1) the “frightened animal” metaphor with traceable roots to fear-inducing theories, such as Deterrence Theory, and (2) the “weakest link” metaphor with traceable roots to Taylorism and scientific management. We revisit the roots of these two metaphors, critically examine their applicability to the subject matter in cybersecurity, and provide suggestions for improving the status quo.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAssociation for Information Systems
dc.relation.ispartofECIS 2024 : Proceedings of the 32nd European Conference on Information Systems
dc.relation.urihttps://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/
dc.rightsIn Copyright
dc.subject.othercybersecurity
dc.subject.otherinformation security
dc.subject.otherinformation systems security
dc.subject.othermetaphor
dc.subject.otherfrightened animal
dc.subject.otherweakest link
dc.titleReconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research
dc.typeconference paper
dc.identifier.urnURN:NBN:fi:jyu-202405243951
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-958200-10-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.type.versionpublishedVersion
dc.rights.copyright© 2024 AISeL
dc.rights.accesslevelopenAccessfi
dc.type.publicationconferenceObject
dc.relation.conferenceEuropean Conference on Information Systems
dc.subject.ysopelko
dc.subject.ysokielikuvat
dc.subject.ysometaforat
dc.subject.ysotietoturva
dc.subject.ysokyberturvallisuus
dc.subject.ysokehittäminen
dc.subject.ysokäsitteet
dc.subject.ysotietojärjestelmät
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p10848
jyx.subject.urihttp://www.yso.fi/onto/yso/p4677
jyx.subject.urihttp://www.yso.fi/onto/yso/p3517
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p4230
jyx.subject.urihttp://www.yso.fi/onto/yso/p2267
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright