IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Role of Human Factors in Cybersecurity Vulnerabilities

The Role of Human Factors in Cybersecurity Vulnerabilities
View Sample PDF
Author(s): Harish Chandra Verma (ICAR-Central Institute for Subtropical Horticulture, Lucknow.India)and Saurabh Srivastava (Moradabad Institute of Technology, India)
Copyright: 2025
Pages: 12
Source title: Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices
Source Author(s)/Editor(s): Rajeev Kumar (Moradabad Institute of Technology, India), Saurabh Srivastava (Moradabad Institute of Technology, India)and Ahmed A. Elngar (Beni-Suef University, Egypt)
DOI: 10.4018/979-8-3693-9235-5.ch001

Purchase

View The Role of Human Factors in Cybersecurity Vulnerabilities on the publisher's website for pricing and purchasing information.

Abstract

This chapter explores the crucial influence that human behavior and decision-making have on information system security. Human factors continue to be a major source of weaknesses in cybersecurity plans, even while technology measures constitute its core. This study looks into the several ways that human factors—such as social engineering, cognitive biases, and insufficient training—affect cybersecurity risks. The chapter illustrates how human errors, such as weak password practices, and phishing vulnerability, can undermine even the strongest technology defenses by looking at case studies. It emphasizes the significance of strategy for cybersecurity. To lower the risks associated with people, it suggests extensive training plans, approachable system designs, and organizational guidelines. In an effort to reduce human error, the chapter also examines new developments in the field, such as behavioural biometrics and AI-driven monitoring systems. In the end, this chapter highlights how important it is to address human elements in order to improve overall cybersecurity resilience

Related Content

Harish Chandra Verma, Saurabh Srivastava. © 2025. 12 pages.
Lingala Thirupathi, B. Vasundara, Dheeraj Sundaragiri, Vijaya Bhaskar Ch, Ravi Gugulothu, Radhika Pulyala. © 2025. 26 pages.
Mohd Saleem, Rajeev Kumar, Chanchal Chawla, Mahendra Singh. © 2025. 14 pages.
Nobhonil Roy Choudhury, Shyamalendu Paul. © 2025. 22 pages.
Abhay Bhatia, Anil Kumar, Devendra Sood. © 2025. 32 pages.
Aparna Datta, Akash Mondal, Arunima Sarkar. © 2025. 16 pages.
Adrija Das, Pratyasha Nanda, Ritika Jain, Tanisha Saini, Sneha Bhaskar, Hitesh Mohapatra. © 2025. 18 pages.
Body Bottom