Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.6.32

Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey  

Al-Amri, Bayan O (Department of Computer Science, College of Computers and Information Technology, Taif University)
Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al Qura University)
Alsuwat, Emad (Department of Computer Science, College of Computers and Information Technology, Taif University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.6, 2021 , pp. 245-251 More about this Journal
Abstract
This work aims to focus on the current features and characteristics of Human Element and Artificial intelligence (AI), ask some questions about future information security, and whether we can avoid human errors by improving machine learning and AI or invest in human knowledge more and work them both together in the best way possible? This work represents several related research results on human behavior towards information security, specified with elements and factors like knowledge and attitude, and how much are they invested for ISA (information security awareness), then presenting some of the latest studies on AI and their contributions to further improvements, making the field more securely advanced, we aim to open a new type of thinking in the cybersecurity field and we wish our suggestions of utilizing each point of strengths in both human attributions in software security and the existence of a well-built AI are going to make better future software security.
Keywords
Cybersecurity; ISA; Software Security; Artificial intelligence; Human Factor;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. HeinstrAm, "Five personality dimensions and their influence on information behaviour," Information research, vol. 9, pp. 9-1, 2003.
2 D. Fahrenholtz and A. Bartelt, "Towards a sociological view of trust in computer science," in Proceedings of the eighth research symposium on emerging electronic markets (RSEEM 01), 2001.
3 M. Pattinson, M. Butavicius, K. Parsons, A. McCormac, and D. Calic, "Factors that influence information security Behavior: An australian web-based study," in International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 231-241.
4 P. E. Spector, "A consideration of the validity and meaning of self-report measures of job conditions," 1992.
5 C. Vroom and R. Von Solms, "Towards information security behavioural compliance," Computers & security, vol. 23, pp. 191-198, 2004.   DOI
6 M. Alhabeeb, A. Almuhaideb, P. D. Le, and B. Srinivasan, "Information security threats classification pyramid," in 2010 IEEE 24th international conference on advanced information networking and applications workshops, pp. 208-213.
7 A. McCue, "Beware the insider security threat,a€‹ CIO Jury," 2008.
8 W. Pieters, "Explanation and trust: what to tell the user in security and AI?," Ethics and information technology, vol. 13, pp. 53-64.   DOI
9 B. B. Bederson, B. Lee, R. M. Sherman, P. S. Herrnson, and R. G. Niemi, "Electronic voting system usability issues," in Proceedings of the SIGCHI conference on Human factors in computing systems, 2003, pp. 145-152.
10 N. Luhmann, "Familiarity, confidence, trust: Problems and alternatives," Trust: Making and breaking cooperative relations, vol. 6, pp. 94-107, 2000.
11 J. H. Park, "England's controversy over the secret ballot," Political Science Quarterly, vol. 46, pp. 51-86, 1931.   DOI
12 Y. Pan, "Heading toward artificial intelligence 2.0. Engineering, 2 (4): 409-413."   DOI
13 R. J. Mejias and P. A. Balthazard, "A model of information security awareness for assessing information security risk for emerging technologies," Journal of Information Privacy and Security, vol. 10, pp. 160-185.   DOI
14 A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE transactions on dependable and secure computing, vol. 1, pp. 11-33, 2004.   DOI
15 P. Coopers, "Key findings from the Global State of Information Security Survey 2013," Changing the game.
16 S. M. Furnell, A. Jusoh, and D. Katsabas, "The challenges of understanding and using security: A survey of end-users," Computers & Security, vol. 25, pp. 27-35, 2006.   DOI
17 K. Parsons, A. McCormac, M. Butavicius, M. Pattinson, and C. Jerram, "Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)," Computers & Security, vol. 42, pp. 165-176.   DOI
18 B. ISO, "iso," IEC Directives Part, vol. 1, 2008.
19 M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," ANT/SEIT, vol. 32, pp. 489-496.
20 A. McCormac, T. Zwaans, K. Parsons, D. Calic, M. Butavicius, and M. Pattinson, "Individual differences and information security awareness," Computers in human behavior, vol. 69, pp. 151-156.   DOI
21 H. A. Kruger and W. D. Kearney, "A prototype for assessing information security awareness," Computers & security, vol. 25, pp. 289-296, 2006.   DOI
22 S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, "Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 373-382.
23 S. GeriA‡ and A. e. Hutinski, "Information system security threats classifications," Journal of Information and organizational sciences, vol. 31, pp. 51-61, 2007.
24 B.-h. Li, B.-c. Hou, W.-t. Yu, X.-b. Lu, and C.-w. Yang, "Applications of artificial intelligence in intelligent manufacturing: a review," Frontiers of Information Technology & Electronic Engineering, vol. 18, pp. 86-96.   DOI
25 B. Harris and D. Allen, Black box voting: Ballot tampering in the 21st century: Talion Pub., 2004.
26 K. Veeramachaneni, I. Arnaldo, V. Korrapati, C. Bassias, and K. Li, "AI^ 2: training a big data machine to defend," in 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), pp. 49-54.
27 K. Parsons, A. McCormac, M. Butavicius, and L. Ferguson, "Human factors and information security: individual, culture, and security environment," DEFENCE SCIENCE AND TECHNOLOGY ORGANISATION EDINBURGH (AUSTRALIA) COMMANDA a€¦.