Preventing cybercrime: A framework for understanding the role of human vulnerabilities
Christopher S. Kayser,
Mary Ellen Mastrorilli and
Robert Cadigan
Additional contact information
Christopher S. Kayser: Cybercrime Analytics Inc., Canada
Mary Ellen Mastrorilli: Boston University
Robert Cadigan: Boston University, USA
Cyber Security: A Peer-Reviewed Journal, 2019, vol. 3, issue 2, 159-174
Abstract:
Cybercrime is the fastest growing form of crime in the world today. Currently, advancements in artificial intelligence (AI) and machine learning (ML) cannot accurately predict how humans will respond to cyberattacks, particularly those that incorporate social engineering (SEing) into their design. Cybercriminals have learned to utilise SEing as an effective means to dupe users of technology (UoT) to into being victimised by capitalising on known vulnerabilities related to human nature and human curiosity, which the authors collectively refer to as the human dimension. This paper introduces a new theory, Required Elements for a Social Engineered Cyber Attack Theory (RESCAT), which provides a more complete understanding of how social engineers (SEs) design cyberattacks, based upon these elements, to increase the probability of a successful cyberattack. RESCAT applies and expands upon routine activities theory (RAT) in an effort to better understand cyber deviance in cyberspace. The paper argues that an expanded approach drawing on criminological theory can reduce the incidence rates of such crimes and propose that incorporating the concepts of RESCAT as a complement to current technology solutions will decrease the risks of being victimised by a cyberattack.
Keywords: cybercrime; human curiosity; human dimension; human nature; Required Elements for a Social Engineered Cyber Attack Theory (RESCAT); social engineering (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2019
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/5321/download/ (application/pdf)
https://hstalks.com/article/5321/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2019:v:3:i:2:p:159-174
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().