Environment, personality, risk perception, cognitive biases and cognitive processes, and various demographics affect an individual’s susceptibility to social engineering and risky decision making. Combinations of these factors increase vulnerability and likelihood that a person will fall for a social engineering attack. Cognitive biases will hinder an individual’s decision-making, causing him or her to believe that he or she is using accurate judgment when the decisions are in reality irrational. These biases are influenced by an individual’s personality, and additionally by their current emotional state. Further, other dispositional factors like trust and risk perception will play a role in how the individual forms their decision. In connection with the dispositional factors are state-induced factors, like cultural backgrounds and environments. Both of these elements lead to experiences that will be gathered and stored in an individual’s memories to be compared upon when making future decisions. Using the knowledge of these dispositional and state-induced factors, as well as their interactions, organizations and businesses can create targeted trainings and educations to combat the increasing and dangerous unintentional insider threat problem.
|Advisor:||Riddell, Chris, Corbo, Leslie|
|School Location:||United States -- New York|
|Source:||MAI 81/7(E), Masters Abstracts International|
|Subjects:||Information Technology, Psychology|
|Keywords:||Cognitive bias, Cybersecurity, Insider threat, Risk perception, Social engineering, Vulnerability|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be