Reference Hub1
Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity

Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity

Samantha Bordoff, Quan Chen, Zheng Yan
ISBN13: 9781522588979|ISBN10: 1522588973|EISBN13: 9781522588986
DOI: 10.4018/978-1-5225-8897-9.ch002
Cite Chapter Cite Chapter

MLA

Bordoff, Samantha, et al. "Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity." Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 20-37. https://doi.org/10.4018/978-1-5225-8897-9.ch002

APA

Bordoff, S., Chen, Q., & Yan, Z. (2019). Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity. In I. Management Association (Ed.), Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 20-37). IGI Global. https://doi.org/10.4018/978-1-5225-8897-9.ch002

Chicago

Bordoff, Samantha, Quan Chen, and Zheng Yan. "Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity." In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 20-37. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8897-9.ch002

Export Reference

Mendeley
Favorite

Abstract

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategy to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.