Cybersecurity as a social phenomenon

John Mcalaney, Vladlena Benson

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Humans are social creatures. Our behaviour is influenced by our perceptions of those around us, often to a much greater degree than we realize. However, we tend to make mistakes in our understanding of those around us and the situations that we encounter. We do so because our cognitive resources have limits, meaning that we have developed systems of coming to quick conclusions based on limited information. These processes are known as heuristics. This is not a flaw; rather it is an adaptive strategy that allows us to navigate and survive in our social worlds. Nevertheless, these tendencies may lead people to engage in cybersecurity in risky ways, either as the instigators of attacks, the targets of attacks, or the cybersecurity professionals who seek to prevent and mitigate attacks. Examples of this include group dynamics in which individuals overestimate the abilities of their own group whilst underestimating the abilities of competing groups, or failing to recognize the threat of cybersecurity risks that are difficult to visualize. In ways like those used with marketing and advertising campaigns, social engineers aim to exploit these quirks of social influence and human decision making. A greater understanding of these processes will enable us to develop more informed prevention and mitigation strategies in order to address the increasing challenges we face within cybersecurity.
Original languageEnglish
Title of host publicationCyber Influence and Cognitive Threats
Pages1-8
DOIs
Publication statusPublished - 2020

Fingerprint

advertising campaign
group dynamics
ability
engineer
heuristics
marketing
Group
threat
decision making
resources

Bibliographical note

Copyright © 2020 Elsevier Inc.

Cite this

Mcalaney, J., & Benson, V. (2020). Cybersecurity as a social phenomenon. In Cyber Influence and Cognitive Threats (pp. 1-8) https://doi.org/10.1016/B978-0-12-819204-7.00001-4
Mcalaney, John ; Benson, Vladlena. / Cybersecurity as a social phenomenon. Cyber Influence and Cognitive Threats. 2020. pp. 1-8
@inbook{a769557935204a949f7a3c35066c1478,
title = "Cybersecurity as a social phenomenon",
abstract = "Humans are social creatures. Our behaviour is influenced by our perceptions of those around us, often to a much greater degree than we realize. However, we tend to make mistakes in our understanding of those around us and the situations that we encounter. We do so because our cognitive resources have limits, meaning that we have developed systems of coming to quick conclusions based on limited information. These processes are known as heuristics. This is not a flaw; rather it is an adaptive strategy that allows us to navigate and survive in our social worlds. Nevertheless, these tendencies may lead people to engage in cybersecurity in risky ways, either as the instigators of attacks, the targets of attacks, or the cybersecurity professionals who seek to prevent and mitigate attacks. Examples of this include group dynamics in which individuals overestimate the abilities of their own group whilst underestimating the abilities of competing groups, or failing to recognize the threat of cybersecurity risks that are difficult to visualize. In ways like those used with marketing and advertising campaigns, social engineers aim to exploit these quirks of social influence and human decision making. A greater understanding of these processes will enable us to develop more informed prevention and mitigation strategies in order to address the increasing challenges we face within cybersecurity.",
author = "John Mcalaney and Vladlena Benson",
note = "Copyright {\circledC} 2020 Elsevier Inc.",
year = "2020",
doi = "10.1016/B978-0-12-819204-7.00001-4",
language = "English",
isbn = "9780128192047",
pages = "1--8",
booktitle = "Cyber Influence and Cognitive Threats",

}

Mcalaney, J & Benson, V 2020, Cybersecurity as a social phenomenon. in Cyber Influence and Cognitive Threats. pp. 1-8. https://doi.org/10.1016/B978-0-12-819204-7.00001-4

Cybersecurity as a social phenomenon. / Mcalaney, John; Benson, Vladlena.

Cyber Influence and Cognitive Threats. 2020. p. 1-8.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Cybersecurity as a social phenomenon

AU - Mcalaney, John

AU - Benson, Vladlena

N1 - Copyright © 2020 Elsevier Inc.

PY - 2020

Y1 - 2020

N2 - Humans are social creatures. Our behaviour is influenced by our perceptions of those around us, often to a much greater degree than we realize. However, we tend to make mistakes in our understanding of those around us and the situations that we encounter. We do so because our cognitive resources have limits, meaning that we have developed systems of coming to quick conclusions based on limited information. These processes are known as heuristics. This is not a flaw; rather it is an adaptive strategy that allows us to navigate and survive in our social worlds. Nevertheless, these tendencies may lead people to engage in cybersecurity in risky ways, either as the instigators of attacks, the targets of attacks, or the cybersecurity professionals who seek to prevent and mitigate attacks. Examples of this include group dynamics in which individuals overestimate the abilities of their own group whilst underestimating the abilities of competing groups, or failing to recognize the threat of cybersecurity risks that are difficult to visualize. In ways like those used with marketing and advertising campaigns, social engineers aim to exploit these quirks of social influence and human decision making. A greater understanding of these processes will enable us to develop more informed prevention and mitigation strategies in order to address the increasing challenges we face within cybersecurity.

AB - Humans are social creatures. Our behaviour is influenced by our perceptions of those around us, often to a much greater degree than we realize. However, we tend to make mistakes in our understanding of those around us and the situations that we encounter. We do so because our cognitive resources have limits, meaning that we have developed systems of coming to quick conclusions based on limited information. These processes are known as heuristics. This is not a flaw; rather it is an adaptive strategy that allows us to navigate and survive in our social worlds. Nevertheless, these tendencies may lead people to engage in cybersecurity in risky ways, either as the instigators of attacks, the targets of attacks, or the cybersecurity professionals who seek to prevent and mitigate attacks. Examples of this include group dynamics in which individuals overestimate the abilities of their own group whilst underestimating the abilities of competing groups, or failing to recognize the threat of cybersecurity risks that are difficult to visualize. In ways like those used with marketing and advertising campaigns, social engineers aim to exploit these quirks of social influence and human decision making. A greater understanding of these processes will enable us to develop more informed prevention and mitigation strategies in order to address the increasing challenges we face within cybersecurity.

U2 - 10.1016/B978-0-12-819204-7.00001-4

DO - 10.1016/B978-0-12-819204-7.00001-4

M3 - Chapter

SN - 9780128192047

SP - 1

EP - 8

BT - Cyber Influence and Cognitive Threats

ER -

Mcalaney J, Benson V. Cybersecurity as a social phenomenon. In Cyber Influence and Cognitive Threats. 2020. p. 1-8 https://doi.org/10.1016/B978-0-12-819204-7.00001-4