Acceso abierto

The Intersectionality of Offensive Cybersecurity and Human Factors: A Position Paper


Cite

Aldabbas, M., & Teufel, B. (2016). Human aspects of smart technologies’ security: the role of human failure. Journal of Electronic Science and Technology, 14(4), 311-318. Search in Google Scholar

Aldawood, H., & Skinner, G. (2018, December). Educating and raising awareness on cyber security social engineering: A literature review. In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, 62-68. IEEE. Search in Google Scholar

American International Group (AIG). (n.d.). Human cyber risk: The first line of defence. Available at: https://www.aig.co.uk/content/dam/aig/emea/united-kingdom/documents/Insights/cyber-human-factor.pdf. Search in Google Scholar

Andersson, I., Bjursell, L., & Palm, I. (2023). Hack the Human: A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations. Search in Google Scholar

Barton, T. (2023, April 20). The human attack vector: Social engineering. Available at: https://www.nextdlp.com/resources/blog/human-attack-vector-social-engineering. Search in Google Scholar

Benson, V., McAlaney, J., & Frumkin, L.A. (2019). Emerging threats for the human element and countermeasures in the current cyber security landscape. In Cyber Law, Privacy, and Security: Concepts, methodologies, tools, and applications, 1264-1269. IGI Global. Search in Google Scholar

Boy, G.A. (2017). Human-centered design of complex systems: An experience-based approach. Design Science, 3. Search in Google Scholar

Bone, J. (2017). Cognitive Hack: The New Battleground in Cybersecurity... the Human Mind. CRC Press. Search in Google Scholar

Contreras, J.M. (2022, March 22). Why tech products should be designed alongside psychologists. Available at: https://thedecisionlab.com/insights/technology/why-tech-products-should-be-designed-alongside-psychologists. Search in Google Scholar

Coatesworth, B. (2023). The psychology of social engineering. Cyber Security: A Peer-Reviewed Journal, 6(3), 261-274. Search in Google Scholar

Coffey, J.W. (2017). Ameliorating sources of human error in cybersecurity: technological and human-centered approaches. In the 8th International Multi-Conference on Complexity, Informatics, and Cybernetics, Pensacola, 85-88. Search in Google Scholar

Cybenko, G., Giani, A., & Thompson, P. (2002). Cognitive hacking: A battle for the mind. Computer, 35(8), 50-56. Search in Google Scholar

Cybriant. (n.d.). Understanding cybersecurity attack vectors and protecting your data. Available at: https://cybriant.com/understanding-cybersecurity-attack-vectors. Search in Google Scholar

Evans, M., Maglaras, L.A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679. Search in Google Scholar

Federal Bureau of Investigations (FBI). (2021). Federal Bureau of Investigation: Internet Crime Report 2021. Available at: https://www.ic3.gov/. Search in Google Scholar

Fritsch, L., Jaber, A., & Yazidi, A. (2022, May). An overview of artificial intelligence used in malware. In Symposium of the Norwegian AI Society, 41-51. Cham: Springer International Publishing. Search in Google Scholar

Guastello, S.J. (2023). Human factors engineering and ergonomics: A systems approach. CRC Press. Search in Google Scholar

Godin, A. (2017). Using COIN Doctrine to improve cyber security policies. Available at: https://www.sans.org/white-papers/37557/. Search in Google Scholar

Hiesgen, R., Nawrocki, M., Schmidt, T.C., & Wählisch, M. (2022). The race to the vulnerable: Measuring the log4j shell incident. arXiv preprint arXiv:2205.02544. Search in Google Scholar

Hollnagel, E. (2016). The nitty-gritty of human factors. Human factors and ergonomics in practice: Improving system performance and human well-being in the real world, 45-64. Search in Google Scholar

Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook, 149-164. Syngress. Search in Google Scholar

Janczewski, L.J., & Fu, L. (2010, October). Social engineering-based attacks: Model and New Zealand perspective. In Proceedings of the International Multiconference on ComputerScience and Information Technology, 847-853. IEEE. Search in Google Scholar

Jeong, J., Mihelcic, J., Oliver, G., & Rudolph, C. (2019, December). Towards an improved understanding of human factors in cybersecurity. In 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 338-345. IEEE. Search in Google Scholar

Joinson, A., & van Steen, T. (2018). Human aspects of cyber security: Behaviour or culture change? Cyber Security: A Peer-Reviewed Journal, 1(4), 351-360. Search in Google Scholar

Jones, D. (2023, June 05). Cybercriminals target C-suite, family members with sophisticated attacks. Available at: https://www.cybersecuritydive.com/news/cybercriminals-target-c-suite/652052/. Search in Google Scholar

Kamoun, F., Iqbal, F., Esseghir, M.A., & Baker, T. (2020, October). AI and machine learning: A mixed blessing for cybersecurity. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1-7. IEEE. Search in Google Scholar

Kim, K., Alfouzan, F.A., & Kim, H. (2021). Cyber-attack scoring model based on the offensive cybersecurity framework. Applied Sciences, 11(16), 7738. Search in Google Scholar

Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3(1), 1-18. Search in Google Scholar

Maathuis, C., & Chockalingam, S. (2022, June). Responsible digital security behaviour: Definition and assessment model. In European Conference on Cyber Warfare and Security, Vol. 21, No. 1. Search in Google Scholar

MIT and DarkTrace. (2021, April 8). Preparing for AI-enabled cyberattacks. MIT Technology Review Insights. Technologyreview.com. Available at: https://www.technologyreview.com/2021/04/08/1021696/preparing-for-ai-enabled-cyberattacks/. Search in Google Scholar

Mohammad, T., Hussin, N.A.M., & Husin, M.H. (2022). Online safety awareness and human factors: An application of the theory of human ecology, Technology in Society, 68, 101823. Search in Google Scholar

Montasari, R., Hosseinian-Far, A., & Hill, R. (2018). Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments. Cyber criminology, 71-93. Search in Google Scholar

Mortazavi-Alavi, R. (2016). A risk-driven investment model for analysing human factors in information security (Doctoral dissertation, University of East London). Search in Google Scholar

Moustafa, A.A., Bello, A., & Maurushat, A. (2021). The role of user behaviour in improving cyber security management. Frontiers in Psychology, 12, 561011. Search in Google Scholar

Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA–Journal of Business and Public Administration, 9(3), 71-88. Search in Google Scholar

Nobles, C. (2019). Establishing human factors programs to mitigate blind spots in cybersecurity. MWAIS 2019 Proceedings, 22. Search in Google Scholar

Nobles, C., Robinson, N., & Cunningham, M.(2022, September). Straightfrom the human factors professionals’ mouths: The Need to Teach Human Factors in Cybersecurity. In Proceedings of the 23rd Annual Conference on Information Technology Education, 157-158. Search in Google Scholar

Nobles, C. (2022). Stress, burnout, and security fatigue in cybersecurity: A human factors problem. HOLISTICA–Journal of Business and Public Administration, 13(1), 49-72. Search in Google Scholar

Nobles, C. (2022a, March) The Dunning-Kruger Effect around human factors in cybersecurity, Top Cyber News Magazine. Avaialble at: https://www.linkedin.com/company/topcybernews/. Search in Google Scholar

Patient Safety Network (PSN). (2019, September 07). Human factors engineering. Available at: https://psnet.ahrq.gov/primer/human-factors-engineering#. Search in Google Scholar

Pratt, M.K. (2023, July 04). Why cyberpsychology is such an important part of effective cybersecurity. Available at: https://www.csoonline.com/article/643967/whycyberpsychology-is-such-an-important-part-of-effective-cybersecurity.html. Search in Google Scholar

Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021, June). Human factors in cybersecurity: A scoping review, In The 12th International Conference on Advances in Information Technology, 1-11. Search in Google Scholar

Robinson, N. (2023). Human factors security engineering: the future of cybersecurity teams. EDPACS, 1-17. Search in Google Scholar

Rogers, W.A., & McGlynn, S.A. (2018). Human factors and ergonomics: History, scope, and potential. In Human Factors and Ergonomics for the Gulf Cooperation Council, 1-20. CRC Press. Search in Google Scholar

Sharit, J. (2012). Human error and human reliability analysis. Handbook of human factors and ergonomics, 734-800. Search in Google Scholar

Smeets, M. (2018). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90-113. Search in Google Scholar

Stein, A. (2018, June 22). Few minutes with Alexander Stein. CISO Mag.com. Available at: https://www.cisomag.com/few-minutes-with-alexander-stein/. Search in Google Scholar

Taylor-Jackson, J., McAlaney, J., Foster, J.L., Bello, A., Maurushat, A., & Dale, J. (2020). Incorporating psychology into cyber security education: a pedagogical approach. In Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers 24, 207-217. Springer International Publishing. Search in Google Scholar

Tetaly, M. & Kulkarni, P. (2022, October). Artificial intelligence in cyber security – A threat or a solution. In AIP Conference Proceedings 2519, p. 030036. Search in Google Scholar

Uren, T., Hogeveen, B., and Hanson, F. (2018, July 04). Defining offensive cyber capabilities. Australian Strategic Policy Institute. Available at: https://www.aspi.org.au/report/defining-offensive-cyber-capabilities. Search in Google Scholar

U.S. Office of the Chairman of the Joint Chiefs of Staff. Cyberspace Operations. Joint Publication (J.P.) 3-12. Washington, DC: CJCS, 8 June 2018. Search in Google Scholar

Verizon. (2023). Data breach investigations report. Available at: https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/. Search in Google Scholar

Wang, Z., Sun, L., & Zhu, H. (2020). Defining Social Engineering in Cybersecurity. IEEE Access, 8, 85094-85115. Available at: https://doi.org/10.1109/access.2020.2992807. Search in Google Scholar

Wiederhold, B.K. (2014). The role of psychology in enhancing cybersecurity. Cyberpsychology, Behavior, and Social Networking, 17(3), 131-132. Search in Google Scholar

Wilson, S., Hamilton, & Stallbaum, S. (2020, May 26). The unaddressed gap in cybersecurity: Human performance. MIT Sloan Management Review. Available at: https://sloanreview.mit.edu/article/the-unaddressed-gap-in-cybersecurity-human-performance/. Search in Google Scholar

Wirkuttis, N. & Klein, H. (2017). Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), 103-119. Search in Google Scholar

Yamin, M.M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber attacks. Journal of Information Security and Applications, 57, 102722. Search in Google Scholar

Zurowski, S., Lord, G., & Baggili, I. (2022, August). A quantitative analysis of offensive cyber operations (OCO) automation tools. In Proceedings of the 17th International Conference on Availability, Reliability and Security, 1-11. Search in Google Scholar