Bruggen, 2014 - Google Patents
Studying the impact of security awareness efforts on user behaviorBruggen, 2014
View PDF- Document ID
- 11900835823141510731
- Author
- Bruggen D
- Publication year
External Links
Snippet
Security has long been a technical problem with technical solutions. Over time, it has become apparent that human behavior is a major weakness in technical solutions. Extensive efforts have been taken to inform individuals about the threats and safeguards …
- 230000006399 behavior 0 abstract description 327
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zwilling et al. | Cyber security awareness, knowledge and behavior: A comparative study | |
Van Bruggen et al. | Modifying smartphone user locking behavior | |
Lowry et al. | An integrative theory addressing cyberharassment in the light of technology-based opportunism | |
Distler et al. | A systematic literature review of empirical methods and risk representation in usable privacy and security research | |
Posey et al. | The impact of organizational commitment on insiders’ motivation to protect organizational information assets | |
D'Arcy et al. | User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach | |
Crossler et al. | An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument | |
Akhgar et al. | Cyber crime and cyber terrorism investigator's handbook | |
Bruggen | Studying the impact of security awareness efforts on user behavior | |
Nguyen et al. | A comparison of features in a crowdsourced phishing warning system | |
Ashenden et al. | Can we sell security like soap? A new approach to behaviour change | |
Ammar | Cyber Gremlin: social networking, machine learning and the global war on Al-Qaida-and IS-inspired terrorism | |
Banfield | A study of information security awareness program effectiveness in predicting end-user security behavior | |
Alhasan | Human factors in cybersecurity: A cross-cultural study on trust | |
Anti et al. | Explanations of insider deviant behavior in information security: a systematic literature review | |
Black et al. | Insider Threat and White Collar Crime in Non-Government Organisations and Industries | |
Das | Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior. | |
Kuraku | Curiosity Clicks: The Need for Security Awareness | |
Yeo | Unintentional insider threat assessment framework: Examining the human security indicators in healthcare cybersecurity | |
Dorasamy et al. | Cybersecurity issues among working youths in an iot environment: A design thinking process for solution | |
Mark | An analysis of factors influencing phishing threat avoidance behavior: a quantitative study | |
Jamil | Factors affecting users cybersecurity practices: A study of Australian microbusinesses | |
Bhattacharya | Leadership styles and information security in small businesses: An empirical investigation | |
Murphy | A quantitative study using the protection motivation theory to examine information protection awareness in a healthcare organization | |
Schneider | Customized Cybersecurity Awareness Training: Addressing the Human Factor |