Human behavior in cybersecurity privacy and trust

Publication Date

8-29-2024

Document Type

Contribution to a Book

Publication Title

Human-Computer Interaction in Intelligent Environments

DOI

10.1201/9781003490685-3

First Page

77

Last Page

107

Abstract

This chapter reviews some theoretical frameworks that help to understand human behavior in cybersecurity, privacy, and trust. First, we review the types of attackers and their motivations, we next look at the more significant behavior patterns of attackers in contexts where either organizations or individuals are the victims. Then, the attackers' behaviors are classified into three groups: (1) behavior patterns that attackers use to establish trust in the digital world, (2) behavior patterns used to collect users' private information, and (3) behavior patterns attackers use to produce vulnerable behavior. We follow with a review of cybersecurity hygiene, awareness, training, motivation, the complexity of changing behavior, and a summary.

Department

Industrial and Systems Engineering

Share

COinS