The effects of human factor dynamics in cyber security in kuwait
The effects of human factor dynamics in cyber security in kuwait
- Author(s): S. Zaman 1
- DOI: 10.1049/icp.2021.0836
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): S. Zaman 1
-
-
View affiliations
-
Affiliations:
1:
Information Science Department , College of Life Sciences, Kuwait University , State of Kuwait
Source:
3rd Smart Cities Symposium (SCS 2020),
2021
p.
103 – 108
-
Affiliations:
1:
Information Science Department , College of Life Sciences, Kuwait University , State of Kuwait
- Conference: 3rd Smart Cities Symposium (SCS 2020)
- DOI: 10.1049/icp.2021.0836
- ISBN: 978-1-83953-522-2
- Location: Online Conference
- Conference date: 21-23 September 2020
- Format: PDF
Human behaviour plays a significant role in computer security and ultimately associated risks. Human behaviour can be measured by many factors. In this survey, we use the following factors: omission, commission, extraneous acts, sequential acts, and time errors [1]. These factors are used to interpret the attitudes and behaviours of the human with respect to information security; and discover how the people behaviour is consistently referred to as the weakest link in security that may lead to huge harm to the organization and financial losses. We apply these factors on employees in Kuwait. Results and analysis will be clearly described. By the end of this article, recommendations will be provided as to how the human and cultural factors can be influenced to result in more positive behaviours and lead to more secure information environments.
Inspec keywords: behavioural sciences computing; security of data; human factors
Subjects: Social and behavioural sciences computing; Data security