Human behavior in cybersecurity privacy and trust

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter reviews some theoretical frameworks that help to understand human behavior in cybersecurity, privacy, and trust. First, we review the types of attackers and their motivations, we next look at the more significant behavior patterns of attackers in contexts where either organizations or individuals are the victims. Then, the attackers' behaviors are classified into three groups: (1) behavior patterns that attackers use to establish trust in the digital world, (2) behavior patterns used to collect users' private information, and (3) behavior patterns attackers use to produce vulnerable behavior. We follow with a review of cybersecurity hygiene, awareness, training, motivation, the complexity of changing behavior, and a summary.

Cite

CITATION STYLE

APA

Moallem, A. (2024). Human behavior in cybersecurity privacy and trust. In Human-Computer Interaction in Intelligent Environments (pp. 77–107). CRC Press. https://doi.org/10.1201/9781003490685-3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free