Reference Hub5
Human Factors in Cybersecurity: Issues and Challenges in Big Data

Human Factors in Cybersecurity: Issues and Challenges in Big Data

Xichen Zhang, Ali A. Ghorbani
Copyright: © 2020 |Pages: 31
ISBN13: 9781522597421|ISBN10: 1522597425|EISBN13: 9781522597445
DOI: 10.4018/978-1-5225-9742-1.ch003
Cite Chapter Cite Chapter

MLA

Zhang, Xichen, and Ali A. Ghorbani. "Human Factors in Cybersecurity: Issues and Challenges in Big Data." Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, IGI Global, 2020, pp. 66-96. https://doi.org/10.4018/978-1-5225-9742-1.ch003

APA

Zhang, X. & Ghorbani, A. A. (2020). Human Factors in Cybersecurity: Issues and Challenges in Big Data. In R. Joshi & B. Gupta (Eds.), Security, Privacy, and Forensics Issues in Big Data (pp. 66-96). IGI Global. https://doi.org/10.4018/978-1-5225-9742-1.ch003

Chicago

Zhang, Xichen, and Ali A. Ghorbani. "Human Factors in Cybersecurity: Issues and Challenges in Big Data." In Security, Privacy, and Forensics Issues in Big Data, edited by Ramesh C. Joshi and Brij B. Gupta, 66-96. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9742-1.ch003

Export Reference

Mendeley
Favorite

Abstract

Over recent years, the extensive development of information technology has dramatically advanced the way that people use the internet. The fast growth of the internet of things and mobile crowdsensing applications raise challenging security and privacy issues for the society. More often than before, malicious attackers exploit human vulnerability as the weakest link to launch cyberattacks and conduct fraudulent online activities. How to profile users' daily behavior becomes an essential component for identifying users' vulnerable/malicious level and predicting the potential cyber threats. In this chapter, the authors discuss human factors and their related issues in cyber security and privacy. Three categories of human behaviors—desktop behavior, mobile behavior, and online behavior—and their corresponding security and privacy issues are demonstrated in detail to estimate the vulnerabilities of internet users. Some future directions related to human-factor based security and privacy issues are proposed at the end of this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.