Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Three-Vector Approach to Blind Spots in Cybersecurity

A Three-Vector Approach to Blind Spots in Cybersecurity
View Sample PDF
Author(s): Mika Westerlund (Carleton University, Canada), Dan Craigen (Carleton University, Canada), Tony Bailetti (Carleton University, Canada) and Uruemu Agwae (Carleton University, Canada)
Copyright: 2018
Pages: 10
Source title: Encyclopedia of Information Science and Technology, Fourth Edition
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-2255-3.ch147


View A Three-Vector Approach to Blind Spots in Cybersecurity on the publisher's website for pricing and purchasing information.


Cyberattacks are often successful due to “blind spots” - biases and preconceived information that affect human decision making. Blind spots that obstruct a person's view of malicious activity may result in massive economic losses. This chapter examines eight cases of successful cyberattacks from economic, technological and psychological perspectives to blind spots, termed as “the core vectors”. While previous research has focused on these vectors in isolation, this chapter combines the vectors for an integrated view. As a result, the chapter provides a novel list of blind spots that enable cybercrime.

Related Content

Yair Wiseman. © 2021. 11 pages.
Mário Pereira Véstias. © 2021. 15 pages.
Mahfuzulhoq Chowdhury, Martin Maier. © 2021. 15 pages.
Gen'ichi Yasuda. © 2021. 12 pages.
Alba J. Jerónimo, María P. Barrera, Manuel F. Caro, Adán A. Gómez. © 2021. 19 pages.
Gregor Donaj, Mirjam Sepesy Maučec. © 2021. 14 pages.
Udit Singhania, B. K. Tripathy. © 2021. 11 pages.
Body Bottom