Open Access

Human Error - A Critical Contributing Factor to the Rise in Data Breaches: A Case Study of Higher Education


Cite

Ahola, M. (2022) The role of human error in successful Cybersecurity breaches, Usecure. [Online Document], 2022. Available: Usecure.com Online https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches [Accessed: January 30, 2022] Search in Google Scholar

Alcon J. (2016) 13% of the higher education sector has been infected with ransomware, Cyber Risk Analytics & Security Ratings, 13-Oct-2016. [Online]. Available: https://www.bitsighttech.com/blog/higher-education-infected-with-ransomware. [Accessed: 15-Aug-2022]. Search in Google Scholar

Barati, M. & Yankson, B. (2022) Predicting the Occurrence of a Data Breach.International Journal of Information Management Data Insights, Volume 2, Issue 2, ISSN 2667-0968, https://doi.org/10.1016/j.jjimei.2022.100128. Search in Google Scholar

Blackborrow, J., Christakis, S. (2019) Complexity In Cybersecurity Report 2019 - How Reducing Complexity Leads To Better Security Outcomes. Tech. Rep. May, Forrester’s Security & Risk research group. 2019. Search in Google Scholar

Binghamton University. (2022.). Binghamton University computer and network policy (acceptable use). Binghamton University. Binghamton: N.Y. [Online Document], 2022. Available: ]. https://www.binghamton.edu/its/about/governance/policies/comp-net-usage-acceptable-use.html [Accessed: March 27, 2022 ] Search in Google Scholar

Coffey, J. (2021) Ameliorating Sources of Human Error in CyberSecurity: Technological and Human-Centered Approaches. Journal of Systemics, Cybernetics, and Informatics. [Online Document], 2021. Available: iiis.org Online https://www.iiis.org/CDs2017/CD2017Spring/papers/ZA253LY.pdf. [Accessed: August 27, 2022]. Search in Google Scholar

Campbell, S. (2017) Cybersecurity in higher education: Problems and solutions, Toptal Insights Blog, 22-Dec-2017. [Online]. Available: https://www.toptal.com/insights/innovation/cybersecurity-in-higher-education. [Accessed: 05-Jul-2022]. Search in Google Scholar

Demeyer, S. (2011),Research methods in computer science. 2011 27th IEEE International Conference on Software Maintenance (ICSM), Williamsburg, VI, 2011, pp. 600-600. doi: 10.1109/ICSM.2011.6080841. Search in Google Scholar

D’agostino, S. (2022) Ransomware Attacks Against Higher Ed Increase. insidehighered.com [Online Document], 2022. Available: insidehighered.com Online https://www.insidehighered.com/news/2022/07/22/ransomware-attacks-against-highered-increase [Accessed: March 15, 2022]. Search in Google Scholar

de Heer, W, de Leeuw, E.D, Dillman, D.A, Diment, K. Dommeyer,C.J, Edwards, P., Fox, G. Fraze, S. Fricker, S., Fricker, R.D., Galesic, M. and Goritz, A. S, (2009) Factors affecting response rates of the web survey: A systematic review Computers in Human Behavior, 24-Nov-2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0747563209001708. [Accessed: 05 -Dec-2022]. Search in Google Scholar

Evans, M., Maglaras, L.A., He, Y., and Janicke, H. (2016) Human behavior as an aspect of cybersecurity assurance, Security and Communication Networks, vol. 9, no. 17, pp. 4667–4679, 2016. https://doi.org/10.1002/sec.1657 Search in Google Scholar

Hadlington, L.. (2017) Human factors in cybersecurity; examining the link between internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviors, Heliyon, vol. 3, no. 7, 2017. https://doi.org/10.1016/j.heliyon.2017.e00346 Search in Google Scholar

Halevi, T. Lewis, J & Memon, N. (2013) Phishing, Personality Traits, and Facebook. http://arxiv.org/abs/1301.7643. Search in Google Scholar

Holt, T. (2016) Cybercrime through an interdisciplinary lens. Routledge Taylor & Francis Group. 2016. https://doi.org/10.4324/9781315618456. Search in Google Scholar

IBM. (2014) IBM Security Services 2014 Cyber Security Intelligence Index. IBM Corporation. [Online Document], 2014. Available: IBM.com Online https://www.ibm.com/downloads/cas/ZBZLY7KL [Accessed: March 5, 2022] Search in Google Scholar

IBM. (2019) Cost of a Data Breach Report 2019, IBM Security. [Online Document], 2019. Available: IBM.com Online [Accessed: August 5, 2022] Search in Google Scholar

IBM, (2022) IBM Report: Cost of a Data Breach Hits Record High During Pandemic. 2022. Available: newsroom Online https://newsroom.ibm.com/2021-07-28-IBM-Report-Cost-ofa-Data-Breach-Hits-Record-High-During-Pandemic [Accessed: August 15, 2022] [Accessed: Aug. 23, 2022] Search in Google Scholar

James, A., Winnefeld S., Kirchhoff, C., &Upton, D. (2015) Cybersecurity’s Human Factor: Lessons from the Pentagon. [Online Document], 2022. Available: HBR Online https://hbr.org/2015/09/cybersecuritys-human-factor-lessons-from-the-pentagon [Accessed: July 23, 2022] Search in Google Scholar

Keierleber, M. (2022) L.A. schools and the mystery of missing ransom note, IBM Corporation. [Online Document], 2022. Available: IBM.com Online https://www.the74million.org/article/la-schools-and-the-mystery-of-the-missing-ransom-note/ [Accessed: March 5, 2022] Search in Google Scholar

Khader, M., Karam, M., and Fares, H. (2021) Cybersecurity Awareness Framework for Academia, information, vol. 12, no. 10, p. 417, 2021. https://doi.org/10.3390/info12100417. Search in Google Scholar

Keeter, S., Kennedy, C., Dimock, M., Best, J. Craighill, P.(2006) Public Opinion Quarterly, Volume 70, Issue 5, 2006, Pages 759–779, https://doi.org/10.1093/poq/nfl035 Search in Google Scholar

Marcelino, A. (2022) Intel Selects Check Point Quantum IoT Protect for RISC-V Platform. InfoSecurity. [Online Document], 2022. Available: InfoSecurity.com https://www.infosecurity-magazine.com/search/?q=Check%20Point [Accessed: April 5, 2022]. Search in Google Scholar

NIST. (2022) Security and privacy controls for federal information systems and organizations. (U.S. Department of Commerce, Washington, D.C.), NIST Special Publication 800-53, Rev 4., [Online Document], 2022. Available: http://dx.doi.org/10.6028/NIST.SP.800-53r4 [Accessed: March 27, 2022]. Search in Google Scholar

Nixon J., and McGuinness, B., (2013) Framing the human dimension in cybersecurity, ICST Transactions on Security and Safety, vol. 1, no. 2, 2013. https://doi.org/10.4108/trans.sesa.01-06.2013.e Search in Google Scholar

Nobles, C. (2018) Botching Human Factors in Cybersecurity in Business Organizations. Holistica. 9. 71-88. 10.2478/hjbpa-2018-0024. Search in Google Scholar

Niazi, M. A. (2019) Modeling and simulation of Complex Communication Networks. Stevenage, Herts, United Kingdom: The Institution of Engineering and Technology, 2019. Search in Google Scholar

Person, T., and Holt, T. (2016) Cybercrime through an interdisciplinary lens, Taylor & Francis, 21-Dec-2016. [Online]. Available: https://www.taylorfrancis.com/books/edit/10.4324/9781315618456/cybercrime-interdisciplinary-lens-thomas-holt. [Accessed: 05-Dec-2022]. Search in Google Scholar

Privacy Rights Clearinghouse (2021), Data Breaches, Available: https://privacyrights.org/data-breaches [Accessed May 05, 2021 Search in Google Scholar

The State University of New York. (2022) System-wide print resource use. (SUNY Document No. 6902). SUNY. New York: The NY [Online Document], 2022. Available: https://www.suny.edu/sunypp/documents.cfm?doc_id=891 [Accessed: March 27, 2022]. Search in Google Scholar

The State University of New York. (2016). Information security policy. (SUNY Document No. 6900). SUNY. New York: N.Y. [Online Document], 2022. Available: https://www.suny.edu/sunypp/documents.cfm?doc_id=848 [Accessed: March 27, 2022]. Search in Google Scholar

The State University of New York at Canton. (2022), Faculty Handbook, SUNY Canton. Canton: N.Y. [Online Document], 2022. Available: Canton.edu Online https://www.canton.edu/media/pdf/faculty_handbook.pdf [Accessed: January 17, 2022]. Search in Google Scholar

The State University of New York. (2008). Information security guidelines: Campus programs & preserving confidentiality. (SUNY Document No. 6608). SUNY. New York: N.Y. Search in Google Scholar

University at Albany. (2012). Identity and access management. (Adopted Policy No. 5.1). University at Albany. Albany: N.Y. [Online Document], 2022. Available :. https://www.albany.edu/risk-management-compliance/policy/identity-and-access-management [Accessed: March 27, 2022 ] Search in Google Scholar

Visser, P. Krosnick, J. Marquette, J. & Curtin M. (2019) Mail surveys for election forecasting? An evaluation of the Columbus Dispatch poll. Public Opinion Quarterly, 60(2), 181–227. 2019 Search in Google Scholar

Webster, M. (2022) Human error definition & meaning, Merriam-Webster, 2022. Available: Merriam-Webster Online https://www.merriam-webster.com/dictionary/human%20error [Accessed: March 27, 2022]. Search in Google Scholar

eISSN:
2067-9785
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Business and Economics, Political Economics, other, Business Management, Social Sciences, Sociology