Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/59929

Traditional SETA No More: Investigating the Intersection Between Cybersecurity and Cognitive Neuroscience

File Size Format  
0489.pdf 752.94 kB Adobe PDF View/Open

Item Summary

Title:Traditional SETA No More: Investigating the Intersection Between Cybersecurity and Cognitive Neuroscience
Authors:Zafar, Humayun
Randolph, Adriane
Gupta, Saurabh
Hollingsworth, Carole
Keywords:Innovative Behavioral IS Security and Privacy Research
Internet and the Digital Economy
awareness, cognition, cybersecurity, neuroscience, training
Date Issued:08 Jan 2019
Abstract:We investigated the role automated behavior plays in contributing to security breaches. Using different forms of phishing, combined with multiple neurophysiological tools, we were able to more fully understand the approaches participants took when they engaged with a phishing campaign. The four participants of this pilot study ranged in their individual characteristics of gender and IT experience while controlling for age. It seems the biggest factor for awareness and successfully resisting a phishing campaign may be proximity of security training to engagement with that campaign. Neurophysiological tools helped illustrate the thought processes behind participants’ statements and actions; combined with consideration of individual characteristics, these tools help shed more light on human behavior. In the future, we plan to further enhance our testing environment by incorporating an emergent model that considers work task complexity and incorporate more industry participants with a range of IT experience.
Pages/Duration:10 pages
URI:http://hdl.handle.net/10125/59929
ISBN:978-0-9981331-2-6
DOI:10.24251/HICSS.2019.591
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Innovative Behavioral IS Security and Privacy Research


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons