메뉴 건너뛰기




Volumn , Issue , 2017, Pages 329-338

Accounting for the human user in predictive security models

Author keywords

Computer crime; Computer security; Computer simulation; Human factors; Modeling

Indexed keywords

COMPUTATION THEORY; COMPUTER CRIME; COMPUTER SIMULATION; HUMAN ENGINEERING; MODELS; NETWORK SECURITY; SECURITY OF DATA; SOCIAL SCIENCES;

EID: 85019606698     PISSN: 15410110     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2017.58     Document Type: Conference Paper
Times cited : (6)

References (40)
  • 6
    • 42149161709 scopus 로고    scopus 로고
    • The psychology of security
    • Apr.
    • R. West, "The psychology of security, " Commun. ACM, vol. 51, no. 4, pp. 34-40, Apr. 2008.
    • (2008) Commun. ACM , vol.51 , Issue.4 , pp. 34-40
    • West, R.1
  • 7
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
    • J. D'Arcy, A. Hovav, and D. Galletta, "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, " Information Systems Research, vol. 20, no. 1, pp. 79-98, 2009.
    • (2009) Information Systems Research , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 10
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: The insider threat-who can you trust these days?
    • C. Colwill, "Human factors in information security: The insider threat-who can you trust these days?" Information Security Technical Report, vol. 14, no. 4, pp. 186-196, 2009.
    • (2009) Information Security Technical Report , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 12
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Dec.
    • A. Adams and M. A. Sasse, "Users are not the enemy, " Commun. ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 13
    • 84899540969 scopus 로고    scopus 로고
    • Quantitative security metrics: Unattainable holy grail or a vital breakthrough within our reach?
    • Mar.
    • W. Sanders, "Quantitative security metrics: Unattainable holy grail or a vital breakthrough within our reach?" IEEE Security and Privacy, vol. 12, no. 2, pp. 67-69, Mar. 2014.
    • (2014) IEEE Security and Privacy , vol.12 , Issue.2 , pp. 67-69
    • Sanders, W.1
  • 16
    • 44649188693 scopus 로고    scopus 로고
    • The impact of unavailability on the effectiveness of enterprise information security technologies
    • T. Nanya, F. Maruyama, A. Pataricza, and M. Malek, Eds. Springer Berlin Heidelberg
    • S. E. Parkin, R. Yassin Kassab, and A. van Moorsel, "The impact of unavailability on the effectiveness of enterprise information security technologies, " in Proc. Service Availability: 5th International Service Availability Symposium (ISAS), T. Nanya, F. Maruyama, A. Pataricza, and M. Malek, Eds., vol. 5017. Springer Berlin Heidelberg, 2008, pp. 43-58.
    • (2008) Proc. Service Availability: 5th International Service Availability Symposium (ISAS) , vol.5017 , pp. 43-58
    • Parkin, S.E.1    Yassin Kassab, R.2    Van Moorsel, A.3
  • 17
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • M. Theoharidou, S. Kokolakis, M. Karyda, and E. Kiountouzis, "The insider threat to information systems and the effectiveness of ISO17799, " Computers & Security, vol. 24, no. 6, pp. 472-484, 2005.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 18
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
    • T. Herath and H. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, " Decision Support Systems, vol. 47, no. 2, pp. 154-165, 2009.
    • (2009) Decision Support Systems , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.2
  • 19
    • 33646679400 scopus 로고    scopus 로고
    • To download or not to download: An examination of computer security decision making
    • May
    • J. B. Hardee, R. West, and C. B. Mayhorn, "To download or not to download: An examination of computer security decision making, " ACM interactions, vol. 13, no. 3, pp. 32-37, May 2006.
    • (2006) ACM Interactions , vol.13 , Issue.3 , pp. 32-37
    • Hardee, J.B.1    West, R.2    Mayhorn, C.B.3
  • 20
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
    • P. Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, " Computers & Security, vol. 31, no. 1, pp. 83-95, 2012.
    • (2012) Computers & Security , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 21
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
    • B. Bulgurcu, H. Cavusoglu, and I. Benbasat, "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, " MIS Quarterly, vol. 34, no. 3, pp. 523-548, 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 22
    • 80054707541 scopus 로고    scopus 로고
    • Out of fear or desire? Toward a better understanding of employees' motivation to follow is security policies
    • J.-Y. Son, "Out of fear or desire? toward a better understanding of employees' motivation to follow IS security policies, " Information & Management, vol. 48, no. 7, pp. 296-302, 2011.
    • (2011) Information & Management , vol.48 , Issue.7 , pp. 296-302
    • Son, J.-Y.1
  • 23
    • 77957057727 scopus 로고    scopus 로고
    • Fear appeals and information security behaviors: An empirical study
    • A. C. Johnston and M. Warkentin, "Fear appeals and information security behaviors: An empirical study, " MIS quarterly, vol. 34, no. 3, pp. 549-566, 2010.
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 549-566
    • Johnston, A.C.1    Warkentin, M.2
  • 24
    • 61349092288 scopus 로고    scopus 로고
    • Studying users' computer security behavior: A health belief perspective
    • B.-Y. Ng, A. Kankanhalli, and Y. C. Xu, "Studying users' computer security behavior: A health belief perspective, " Decision Support Systems, vol. 46, no. 4, pp. 815-825, 2009.
    • (2009) Decision Support Systems , vol.46 , Issue.4 , pp. 815-825
    • Ng, B.-Y.1    Kankanhalli, A.2    Xu, Y.C.3
  • 25
    • 0036064934 scopus 로고    scopus 로고
    • A holistic model of computer abuse within organizations
    • J. Lee and Y. Lee, "A holistic model of computer abuse within organizations, " Information Management & Computer Security, vol. 10, no. 2, pp. 57-63, 2002.
    • (2002) Information Management & Computer Security , vol.10 , Issue.2 , pp. 57-63
    • Lee, J.1    Lee, Y.2
  • 26
    • 84944319215 scopus 로고    scopus 로고
    • Stochastic activity networks: Formal definitions and concepts
    • E. Brinksma, H. Hermanns, and J.-P. Katoen, Eds. Springer Berlin Heidelberg
    • W. H. Sanders and J. F. Meyer, "Stochastic activity networks: Formal definitions and concepts, " in Lectures on Formal Methods and Performance Analysis, ser. Lecture Notes in Computer Science, E. Brinksma, H. Hermanns, and J.-P. Katoen, Eds., vol. 2090. Springer Berlin Heidelberg, 2001, pp. 315-343.
    • (2001) Lectures on Formal Methods and Performance Analysis, Ser. Lecture Notes in Computer Science , vol.2090 , pp. 315-343
    • Sanders, W.H.1    Meyer, J.F.2
  • 34
    • 33747205462 scopus 로고    scopus 로고
    • On the brittleness of software and the infeasibility of security metrics
    • S. M. Bellovin, "On the brittleness of software and the infeasibility of security metrics, " IEEE Security & Privacy, vol. 4, no. 4, p. 96, 2006.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.4 , pp. 96
    • Bellovin, S.M.1
  • 35
    • 38949137343 scopus 로고    scopus 로고
    • Estimating a system's mean time-tocompromise
    • Jan.
    • D. Leversage and E. James, "Estimating a system's mean time-tocompromise, " IEEE Security & Privacy, vol. 6, no. 1, pp. 52-60, Jan. 2008.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.1 , pp. 52-60
    • Leversage, D.1    James, E.2
  • 36
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees
    • B. Schneier, "Attack trees, " Dr. Dobbs Journal, vol. 24, no. 12, pp. 21-29, 1999.
    • (1999) Dr. Dobbs Journal , vol.24 , Issue.12 , pp. 21-29
    • Schneier, B.1
  • 39
    • 0242557008 scopus 로고    scopus 로고
    • DoD modeling and simulation (M&S) verification, validation, and accreditation (VV&A)
    • Tech. Rep.
    • P. Sanders, "DoD modeling and simulation (M&S) verification, validation, and accreditation (VV&A), " DTIC Document, Tech. Rep., 1996.
    • (1996) DTIC Document
    • Sanders, P.1
  • 40
    • 0037076425 scopus 로고    scopus 로고
    • Agent-based modeling: Methods and techniques for simulating human systems
    • E. Bonabeau, "Agent-based modeling: Methods and techniques for simulating human systems, " Proceedings of the National Academy of Sciences, vol. 99, no. suppl 3, pp. 7280-7287, 2002.
    • (2002) Proceedings of the National Academy of Sciences , vol.99 , pp. 7280-7287
    • Bonabeau, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.