Cybersecurity as a social phenomenon

John Mcalaney, Vladlena Benson

Research output: Chapter in Book/Published conference outputChapter

Abstract

Humans are social creatures. Our behaviour is influenced by our perceptions of those around us, often to a much greater degree than we realize. However, we tend to make mistakes in our understanding of those around us and the situations that we encounter. We do so because our cognitive resources have limits, meaning that we have developed systems of coming to quick conclusions based on limited information. These processes are known as heuristics. This is not a flaw; rather it is an adaptive strategy that allows us to navigate and survive in our social worlds. Nevertheless, these tendencies may lead people to engage in cybersecurity in risky ways, either as the instigators of attacks, the targets of attacks, or the cybersecurity professionals who seek to prevent and mitigate attacks. Examples of this include group dynamics in which individuals overestimate the abilities of their own group whilst underestimating the abilities of competing groups, or failing to recognize the threat of cybersecurity risks that are difficult to visualize. In ways like those used with marketing and advertising campaigns, social engineers aim to exploit these quirks of social influence and human decision making. A greater understanding of these processes will enable us to develop more informed prevention and mitigation strategies in order to address the increasing challenges we face within cybersecurity.
Original languageEnglish
Title of host publicationCyber Influence and Cognitive Threats
PublisherElsevier
Pages1-8
Number of pages8
ISBN (Electronic)9780128192047
ISBN (Print)9780128192054
DOIs
Publication statusPublished - 2020

Bibliographical note

Copyright © 2020 Elsevier Inc.

Keywords

  • Behaviour analytics
  • Behaviour change
  • Cybercrime
  • Cybersecurity
  • Heuristics
  • Social influence
  • Victimization

Fingerprint

Dive into the research topics of 'Cybersecurity as a social phenomenon'. Together they form a unique fingerprint.

Cite this