Users’ Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior
نویسندگان
چکیده
The internet and digital technologies have become an integral part of people’s daily lives. online world provides many benefits to billions users globally. However, it also brings risks too, because is easy for criminals reach their victims exploit behavior. Nevertheless, often perform risky security behaviors convenience usability, inadequate awareness. With around 25% the world’s population experiencing mental and/or neurological disorders, important understand how users’ psychopathologies manifest themselves in context cybersecurity. This chapter has reviewed symptoms several disorders while considering risks, these been applied evaluate vulnerability cybercrimes cybersecurity practices. findings reveal complexity each disorder influences engagement susceptibility cybercrimes, uniquely, varying degrees, they affect different behaviors.
منابع مشابه
Approach To Solving Cybercrime And Cybersecurity
Cybercrime is becoming ever more serious. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international perspective on fighting Cybercrime. This work seeks to define the concept o...
متن کاملCybercrime prevalence and impact in the UK
Long abstract (c.120 words): Relatively little is known about the scale and cost of cybercrime in the UK, as current industry and academic efforts have produced largely unreliable estimates, often focusing primarily on large businesses. To address this, the authors developed one of the first customer surveys centred on the impact and prevalence of cybercrime to the average UK citizen. Just unde...
متن کاملThe Impact of Different Embodied Agent-Feedback on Users' Behavior
This study investigated whether emotional expressions of an ECA influence the participants ́ nonverbal and verbal behavior. 70 participants took part in a small talk (10 min.) situation with the ECA MAX who was presented with two different types of feedback: emotional feedback (EMO), which provided a feedback about the emotional state of MAX (including smiles and compliments) and envelope feedba...
متن کاملEvaluation of Users’ Perspective on Voip’s Security Vulnerabilities
Voice over Internet protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities. A VoIP system may face either an exclusive attack or an attack to the underlying IP...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computational methods in applied sciences
سال: 2022
ISSN: ['2543-0203', '1871-3033']
DOI: https://doi.org/10.1007/978-3-030-91293-2_5