Human behavior in cybersecurity privacy and trust
Publication Date
8-29-2024
Document Type
Contribution to a Book
Publication Title
Human-Computer Interaction in Intelligent Environments
DOI
10.1201/9781003490685-3
First Page
77
Last Page
107
Abstract
This chapter reviews some theoretical frameworks that help to understand human behavior in cybersecurity, privacy, and trust. First, we review the types of attackers and their motivations, we next look at the more significant behavior patterns of attackers in contexts where either organizations or individuals are the victims. Then, the attackers' behaviors are classified into three groups: (1) behavior patterns that attackers use to establish trust in the digital world, (2) behavior patterns used to collect users' private information, and (3) behavior patterns attackers use to produce vulnerable behavior. We follow with a review of cybersecurity hygiene, awareness, training, motivation, the complexity of changing behavior, and a summary.
Department
Industrial and Systems Engineering
Recommended Citation
Abbas Moallem. "Human behavior in cybersecurity privacy and trust" Human-Computer Interaction in Intelligent Environments (2024): 77-107. https://doi.org/10.1201/9781003490685-3