EconPapers    
Economics at your fingertips  
 

The Symbiotic Threat of Human Error, Intended Action and Cybernetic Security System

Dragos Cosmin Lucian Preda () and Monica Mihaela Frangulea ()
Additional contact information
Dragos Cosmin Lucian Preda: DBA ORBIS Coneco
Monica Mihaela Frangulea: Ion Mincu University of Architecture and Urbanism, Bucharest, Romania, Juxta Foundation

Smart Cities International Conference (SCIC) Proceedings, 2022, vol. 10, 407-416

Abstract: Human error plays a significant role in cyber security breaches. In fact, according to a study by IBM, human error is responsible for 95% of all cybersecurity breaches. This can include unintentional actions or even lack of action by employees that cause, spread, or allow a security breach to occur. While software can sometimes be responsible for cybersecurity, human error still remains the leading cause of cybersecurity breaches. Intended actions, such as deliberate actions taken by individuals or groups to compromise security, are another type of cybernetic security threat. These actions can include hacking, insider threats, information sabotage and cyber espionage. This symbiotic threat between human error and cybernetic security highlights the crucial need to understand the relationship between the two in order to develop stronger cybersecurity behaviors and reduce cyber risk. Training and technology can help reduce the likelihood of human error by increasing awareness and knowledge of cyber security best practices. Additionally, cybersecurity awareness training is predicted to be worth $10 billion by 2027, further emphasizing the importance of addressing human factors in cyber security. By understanding the different types of cybersecurity threats, organizations can better prepare and protect themselves against potential breaches. We will present a real case example of human deliberate act - cybernetic attack of compromising an important architectural project designing process that took place in Athens in 2003, the repercussions of this act and what could be done today in order to avoid a similar situation.

Keywords: cybersecurity; cybernetic attack; cyber management; information sabotage; data security (search for similar items in EconPapers)
JEL-codes: O35 (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://scrd.eu/index.php/scic/article/view/457/418 (application/pdf)
https://scrd.eu/index.php/scic/article/view/457 (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:pop:procee:v:10:y:2022:p:407-416

Access Statistics for this article

More articles in Smart Cities International Conference (SCIC) Proceedings from Smart-EDU Hub, Faculty of Public Administration, National University of Political Studies & Public Administration Contact information at EDIRC.
Bibliographic data for series maintained by Professor Catalin Vrabie ().

 
Page updated 2025-03-19
Handle: RePEc:pop:procee:v:10:y:2022:p:407-416