[HTML][HTML] Hacker types, motivations and strategies: A comprehensive framework

S Chng, HY Lu, A Kumar, D Yau - Computers in Human Behavior Reports, 2022 - Elsevier
Understanding and predicting cyber malfeasance is an emerging area of research with the
increase in cybercrimes and heightened awareness about cybersecurity in recent years. The …

A survey on ethical hacking: issues and challenges

JPA Yaacoub, HN Noura, O Salman… - arXiv preprint arXiv …, 2021 - arxiv.org
Security attacks are growing in an exponential manner and their impact on existing systems
is seriously high and can lead to dangerous consequences. However, in order to reduce the …

Can security become a routine? A study of organizational change in an agile software development group

A Poller, L Kocksch, S Türpe, FA Epp… - Proceedings of the …, 2017 - dl.acm.org
Organizational factors influence the success of security initiatives in software development.
Security audits and developer training can motivate development teams to adopt security …

But who will monitor the monitor?

D Rahman - American Economic Review, 2012 - aeaweb.org
Suppose that providing incentives for a group of individuals in a strategic context requires a
monitor to detect their deviations. What about the monitor's deviations? To address this …

Security in an autonomic computing environment

DM Chess, CC Palmer, SR White - IBM Systems journal, 2003 - ieeexplore.ieee.org
System and network security are vital parts of any autonomic computing solution. The ability
of a system to react consistently and correctly to situations ranging from benign but unusual …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

[图书][B] Information security management: Concepts and practice

BG Raggad - 2010 - taylorfrancis.com
Information security cannot be effectively managed unless secure methods and standards
are integrated into all phases of the information security life cycle. And, although the …

Teaching students to hack: curriculum issues in information security

PY Logan, A Clarkson - Proceedings of the 36th SIGCSE technical …, 2005 - dl.acm.org
Teaching" hacking" as a legitimate means of training students in how to protect a future
employer's data assets has been introduced into courses with increasing frequency. The …

The trouble with security requirements

S Türpe - 2017 IEEE 25th International Requirements …, 2017 - ieeexplore.ieee.org
Manifold approaches to security requirements engineering have been proposed, yet there is
no consensus how to elicit, analyze, or express security needs. This perspective paper …

On the anatomy of human hacking

PO Okenyi, TJ Owens - Information Systems Security, 2007 - Taylor & Francis
Human hacking is a nontechnical kind of intrusion that relies heavily on human
manipulation. Its impact is continuously giving serious concern in the Information technology …