The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
A Three-Vector Approach to Blind Spots in Cybersecurity
|
Author(s): Mika Westerlund (Carleton University, Canada), Dan Craigen (Carleton University, Canada), Tony Bailetti (Carleton University, Canada)and Uruemu Agwae (Carleton University, Canada)
Copyright: 2019
Pages: 12
Source title:
Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics
Source Author(s)/Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-5225-7492-7.ch009
Purchase
|
Abstract
Cyberattacks are often successful due to “blind spots”: biases and preconceived information that affect human decision making. Blind spots that obstruct a person's view of malicious activity may result in massive economic losses. This chapter examines eight cases of successful cyberattacks from economic, technological, and psychological perspectives to blind spots, termed the “core vectors.” While previous research has focused on these vectors in isolation, this chapter combines the vectors for an integrated view. As a result, the chapter provides a novel list of blind spots that enable cybercrime.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|