dc.contributor.author | Soliman, Wael | |
dc.contributor.author | Järveläinen, Jonna | |
dc.date.accessioned | 2024-05-24T12:23:56Z | |
dc.date.available | 2024-05-24T12:23:56Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Soliman, W., & Järveläinen, J. (2024). Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research. In <i>ECIS 2024 : Proceedings of the 32nd European Conference on Information Systems</i>. Association for Information Systems. <a href="https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/" target="_blank">https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/</a> | |
dc.identifier.other | CONVID_213555468 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/95186 | |
dc.description.abstract | The use of metaphors is crucial to advancing not only scientific fields but also in facilitating the development of knowledge and understanding in general. While metaphors facilitate the exchange of novel concepts and ideas, they can also be a hindrance if we do not critically question the root metaphors and the extent to which they apply and do not apply to the subjects we study in cybersecurity research. We find two metaphors to be seemingly popular in characterizing the human actor: (1) the “frightened animal” metaphor with traceable roots to fear-inducing theories, such as Deterrence Theory, and (2) the “weakest link” metaphor with traceable roots to Taylorism and scientific management. We revisit the roots of these two metaphors, critically examine their applicability to the subject matter in cybersecurity, and provide suggestions for improving the status quo. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Association for Information Systems | |
dc.relation.ispartof | ECIS 2024 : Proceedings of the 32nd European Conference on Information Systems | |
dc.relation.uri | https://aisel.aisnet.org/ecis2024/track02_general/track02_general/5/ | |
dc.rights | In Copyright | |
dc.subject.other | cybersecurity | |
dc.subject.other | information security | |
dc.subject.other | information systems security | |
dc.subject.other | metaphor | |
dc.subject.other | frightened animal | |
dc.subject.other | weakest link | |
dc.title | Reconceptualizing the Human in the Loop : A Problematization of Taken-for-Granted Metaphors in Cybersecurity Research | |
dc.type | conference paper | |
dc.identifier.urn | URN:NBN:fi:jyu-202405243951 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.relation.isbn | 978-1-958200-10-0 | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 AISeL | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | conferenceObject | |
dc.relation.conference | European Conference on Information Systems | |
dc.subject.yso | pelko | |
dc.subject.yso | kielikuvat | |
dc.subject.yso | metaforat | |
dc.subject.yso | tietoturva | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | kehittäminen | |
dc.subject.yso | käsitteet | |
dc.subject.yso | tietojärjestelmät | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10848 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4677 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3517 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4230 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2267 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A4 | |