3,253
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Social Psychology: An under-used tool in Cybersecurity

      proceedings-article
      1 , 1 , 1 , 1 , 1
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Social psychology, cybersecurity, hacking, hacktivist, cyber-crime, social identity, group process
      Bookmark

            Abstract

            In cyber-security the weakest link is often seen as the human factor. This has led to discussions about the optimal methods in preventing cyber security breaches. This paper proposes that the fusion of cybersecurity and social psychology can inform and advance attempts to educate those on both sides of the law. Awareness and education will lead to more effective communication between parties and greater understanding of the risks and consequences for cyber attackers and defenders alike.

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Faculty of Science and Technology

            Bournemouth University, United Kingdom
            Article
            10.14236/ewic/HCI2016.64
            95f21e41-9793-49fe-bc08-f00134598018
            © Thackray et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.64
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Social psychology,hacking,social identity,hacktivist,cyber-crime,group process,cybersecurity

            REFERENCES

            1. 2011 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community Fifth International AAAI Conference on Weblogs and Social Media ICWSM 50 57

            2. 2015 Dealer, Hacker, Lawyer, Spy: Modern Techniques and Legal Boundaries of Counter-cybercrime Operations The European Review of Organised Crime 2 2 25 50

            3. 2014 Hacker, hoaxer, whistleblower, spy: The Many Faces of Anonymous London Verso

            4. 2015 Epilogue: The State of Anonymous Hacker, hoaxer, whistleblower, spy: The Many Faces of Anonymous London Verso 401 461

            5. 1996 Profile of a computer hacker Florida Infowar

            6. 2015 Fluidity, Identity, and Organizationality: The Communicative Constitution of Anonymous Journal of Management Studies 52 8 1005 1035

            7. 2011 Dark market: How hackers became the new mafia New York Vintage

            8. 2014 Changing the Game: Addiopizzo’s Mobilisation against Racketeering in Palermo The European Review of Organised Crime 1 1 39 77

            9. 2007 Disinhibition and the Internet Psychology and the Internet: Intrapersonal, interpersonal, and transpersonal implications 2nd San Diego Academic Press 75 92

            10. 2005 Terror and play; or what was hacktivism? Grey Room MIT Press 21 70 93

            11. 1985 Out of the inner circle: a hacker's guide to computer security Bellevue, Washington Microsoft Press

            12. 2015 The benign online disinhibition effect: Could situational factors induce self-disclosure and prosocial behaviors? Cyberpsychology: Journal of Psychosocial Research on Cyberspace 9 2 2 3

            13. 2010 From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik International Studies Quarterly 54 381 401

            14. 2016 Cyber-Psychology: The Key to Securing the Human Element in Your Organization Info Security Magazine available from: https://www.infosecurity-magazine.com/magazine-features/cyberpsychology-securing-human/ accessed 12 03 16

            15. 2013 We are Anonymous London Random House

            16. 2006 A two-dimensional circumplex approach to the development of a hacker taxonomy Digital Investigation 3 2 97 102

            17. 2010 The psyche of cybercriminals: a psycho-social perspective Cybercrimes: A Multidisciplinary Analysis Berlin Springer 217 35

            18. 2015 A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model Digital Investigation 14 36 45

            19. 2004 The Online Disinhibition Effect CyberPsychology & Behavior 7 3 321 326

            20. 1999 Hackers: crime in the digital sublime London Routledge

            Comments

            Comment on this article