Abstract
This chapter reviews some theoretical frameworks that help to understand human behavior in cybersecurity, privacy, and trust. First, we review the types of attackers and their motivations, we next look at the more significant behavior patterns of attackers in contexts where either organizations or individuals are the victims. Then, the attackers' behaviors are classified into three groups: (1) behavior patterns that attackers use to establish trust in the digital world, (2) behavior patterns used to collect users' private information, and (3) behavior patterns attackers use to produce vulnerable behavior. We follow with a review of cybersecurity hygiene, awareness, training, motivation, the complexity of changing behavior, and a summary.
Cite
CITATION STYLE
Moallem, A. (2024). Human behavior in cybersecurity privacy and trust. In Human-Computer Interaction in Intelligent Environments (pp. 77–107). CRC Press. https://doi.org/10.1201/9781003490685-3
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.