Reference Hub5
Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity

Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity

Samantha Bordoff, Quan Chen, Zheng Yan
Copyright: © 2017 |Volume: 7 |Issue: 4 |Pages: 15
ISSN: 2155-7136|EISSN: 2155-7144|EISBN13: 9781522514442|DOI: 10.4018/IJCBPL.2017100106
Cite Article Cite Article

MLA

Bordoff, Samantha, et al. "Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity." IJCBPL vol.7, no.4 2017: pp.68-82. http://doi.org/10.4018/IJCBPL.2017100106

APA

Bordoff, S., Chen, Q., & Yan, Z. (2017). Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity. International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), 7(4), 68-82. http://doi.org/10.4018/IJCBPL.2017100106

Chicago

Bordoff, Samantha, Quan Chen, and Zheng Yan. "Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity," International Journal of Cyber Behavior, Psychology and Learning (IJCBPL) 7, no.4: 68-82. http://doi.org/10.4018/IJCBPL.2017100106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.