Human centric cyber security: What are the new trends in data protection?

@article{Kassicieh2015HumanCC,
  title={Human centric cyber security: What are the new trends in data protection?},
  author={Sul Kassicieh and Valerie Lipinski and Alessandro F. Seazzu},
  journal={2015 Portland International Conference on Management of Engineering and Technology (PICMET)},
  year={2015},
  pages={1321-1338}
}
The debate about the use of automated security measures versus training and awareness of people with access to data (such as employees) to protect sensitive and/or private information has been going on for some time. In this paper, we outline the thinking behind security, what hackers are trying to accomplish and the best ways of combating these efforts using the latest techniques that combine multiple lines of defense. Different major categories of automated security measures as well as major… CONTINUE READING

Figures from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 25 REFERENCES

Can We Make Security Awareness Training Stickier?

Anderson, Kerry
  • ISSA Journal pp
  • 2013
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Blizzard Starcraft II EULA

Blizzard Entertainment
  • Retrieved 8/2/2013 World Wide Web,
  • 2013
VIEW 2 EXCERPTS

Electronic Arts Software End User License Agreement Battlefield 3

Electronic Arts
  • Retrieved 8/2/2013 World Wide Web,
  • 2013
VIEW 2 EXCERPTS

Ijlstra, Mike Lameree; “Blurring the lines 2013 TMT Global Security Study

Buith, Jaques. Henk Marsman, +5 authors Maarten
  • Deloitte Touche Tohmatsu Limited TMT Industry Group
  • 2013
VIEW 2 EXCERPTS

Social and Behavioral Techniques to Boost Awareness”, Royal Holloway University of London, Retrieved 9/4/2013 World Wide Web, cdn.ttgtmedia.com/searchSecurityUK/downloads/RHUL_Oroz_final.pd f

Corona, O Carlos, John Austin
  • 2013
VIEW 2 EXCERPTS