Record Details

Risk and Digital Security: THe perception versus reality and the cognitive biases of online protection.

ICESBA

View Archive Info
 
 
Field Value
 
Authentication Code dc
 
Title Statement Risk and Digital Security: THe perception versus reality and the cognitive biases of online protection.
 
Added Entry - Uncontrolled Name Paul Robert Maskall; University of Suffolk
 
Summary, etc. Abstract word count: 298The feeling of security and our intrinsic perception of risk is an aspect that is both fundamental to our individuality, but also to how we make the inherent decisions necessary to further our own or others wellbeing, but security is just that, a ‘feeling’. Our sense of risk is calculated by a series of trade-offs, contributed by what we associate our individual sense of value to, and what could positively or negatively effect that wellbeing, whether financially, physically or mentally. Our sense of risk however, is plagued with cognitive biases, therefore our perception is very rarely ever based on the reality, meaning that as a society we are inherently bad at efficiently making meaningful trade-offs. (Schneier, B 2008) With this in mind, this is where digital security and identity directly counteracts with that of our natural affinity to associate value to our more tangible assets and possessions. Almost universally, individuals and businesses alike, do not associate the appropriate level of value, therefore do not perceive the risk to the data that we store, or that of the information that we actively disseminate out about ourselves. One of our cognitive biases, the availability heuristic, illustrates that we assign the probability of risk of an event or threat, based on how many examples we can bring to mind. (Sunstein, CR 2004) We watch in the media that cybercrime and fraud is happening constantly, but only to the larger organisations, so when we associate risk, we naturally think that it will not happen to us as an individual or smaller business, because of the examples that we can bring to mind. The reality is that cybercrime and fraud is one of the most pervasive threats to multiple aspects of our wellbeing but sits perfectly just outside our cognitive reasoning of risk. Schneier, B (2008) The Psychology of Security (Part 1), https://www.schneier.com/essays/archives/2008/01/the_psychology_of_se2.htmlSunstein, C.R., (2004) Precautions Against What? The Availability Heuristic and Cross-Cultural Risk Perceptions
 
Publication, Distribution, Etc. ICESBA2017: International Conference on Economic Sciences and Business Administration
2017-10-20 19:06:28
 
Index Term - Genre/Form Peer-reviewed Paper
 
Electronic Location and Access application/pdf
http://icesba.eu/ocs/index.php/ICESBA2017/icesba2017/paper/view/149
 
Data Source Entry ICESBA2017: International Conference on Economic Sciences and Business Administration; International Conference on Economic Sciences and Business Administration
 
Language Note en
 
Terms Governing Use and Reproduction Note Authors who submit to this conference agree to the following terms:<br /> <strong>a)</strong> Authors retain copyright over their work, while allowing the conference to place this unpublished work under a <a href="http://creativecommons.org/licenses/by/3.0/">Creative Commons Attribution License</a>, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.<br /> <strong>b)</strong> Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.<br /> <strong>c)</strong> In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.