The social psychology of cybersecurity

نویسندگان

  • John McAlaney
  • Helen Thackray
  • Jacqui Taylor
چکیده

Online interactions are often based on trust, the sharing of information and a degree of interdependence, as found with many offline relationships. The recent events at companies such as TalkTalk and Ashley Madison are the latest in a series of high profile cybersecurity incidents that demonstrate what happens when this trust relationship is breached. Despite the common media depiction, incidents of this type may not be the result of the archetypal hacker using technological means to hack into a system. Instead cybersecurity attacks are increasingly based primarily on social engineering techniques, which refers to the use of psychological manipulation to trick people into disclosing sensitive information or inappropriately granting access to a secure system (Tetri & Vuorinen, 2013). One of the more well-known examples of social engineering that many of us will have encountered would be phishing emails, which attempt to fool the recipient into opening a link or attachment that will install malicious software onto their computer. These phishing emails draw upon many of principles of social psychology, consumer psychology and behaviour change by, for example, using a fear appeal or invoking a sense of scarcity or urgency if the recipient does not act quickly. These phishing emails may only be successful a fraction of the time, but with the ability to send out tens of thousands of emails at once, at no or zero cost to the sender, this can still be a productive means of gaining access to individuals’ computers. Yet despite the intrinsically psychological nature of many cybersecurity attacks, research into the role of psychology in cybersecurity is still limited. Indeed, even research into social engineering is often conducted from the discipline of computing rather than social psychology.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Social Psychology: An under-used tool in Cybersecurity

In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties an...

متن کامل

A Review of Value-Conflicts in Cybersecurity An assessment based on quantitative and qualitative literature analysis

Cybersecurity is of capital importance in a world where economic and social processes increasingly rely on digital technology. Although the primary ethical motivation of cybersecurity is prevention of informational or physical harm, its enforcement can also entail conflicts with other moral values. This contribution provides an outline of value conflicts in cybersecurity based on a quantitative...

متن کامل

Twitter Sentiment Analysis: An Examination of Cybersecurity Attitudes and Behavior

This exploratory study examines the cybersecurity attitudes and actual behavior over time using the data collected on the social media microblogging platform, Twitter. We plan to use the sentiment analysis and text mining techniques on original tweets related to cybersecurity collected at two different time periods. Upon completion of this research, we would present the analysis of the relation...

متن کامل

Risky Business: Social Trust and Community in the Practice of Cybersecurity for Internet Infrastructure

The security of computer networks and systems on the Internet is a growing and ongoing set of concerns for nation states, corporations, and individuals. Although substantial and valuable work is in progress to secure the hardware and software technologies of the Internet, less attention has been paid to the everyday practices of the people involved in maintaining this infrastructure. In this pa...

متن کامل

Towards a Human Factors Ontology for Cyber Security

Traditional cybersecurity risk assessment is reactive and based on business risk assessment approach. The 2014 NIST Cybersecurity Framework provides businesses with an organizational tool to catalog cybersecurity efforts and areas that need additional support. As part of an on-going effort to develop a holistic, predictive cyber security risk assessment model, the characterization of human fact...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016