Human Factor & Artificial Intelligence: For future software security to be invincible, a confronting comprehensive survey

被引:2
作者
Al-Amri, Bayan O. [1 ]
Alsuwat, Hatim [2 ]
Alsuwat, Emad [1 ]
机构
[1] Taif Univ, Dept Comp Sci, Coll Comp & Informat Technol, At Taif, Saudi Arabia
[2] Umm Al Qura Univ, Dept Comp Sci, Coll Comp & Informat Syst, Mecca, Saudi Arabia
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2021年 / 21卷 / 06期
关键词
Cybersecurity; ISA; Software Security; Artificial intelligence; Human Factor;
D O I
10.22937/IJCSNS.2021.21.6.32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work aims to focus on the current features and characteristics of Human Element and Artificial intelligence (AI), ask some questions about future information security, and whether we can avoid human errors by improving machine learning and AI or invest in human knowledge more and work them both together in the best way possible? This work represents several related research results on human behavior towards information security, specified with elements and factors like knowledge and attitude, and how much are they invested for ISA (information security awareness), then presenting some of the latest studies on AI and their contributions to further improvements, making the field more securely advanced, we aim to open a new type of thinking in the cybersecurity field and we wish our suggestions of utilizing each point of strengths in both human attributions in software security and the existence of a well-built AI are going to make better future software
引用
收藏
页码:245 / 251
页数:7
相关论文
共 27 条
[1]  
Alhabeeb Mohammed, 2010, Proceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA 2010), P208, DOI 10.1109/WAINA.2010.39
[2]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[3]  
B. ISO, 2008, IEC DIR PART IEC DIR PART, V1
[4]  
Bederson B.B., 2003, Human Factors in Computing Systems: Proceedings of CHI 2003, P145
[5]  
Coopers P., CHANGING GAME
[6]  
Fahrenholtz D., 2001, P 8 RES S EM EL MARK P 8 RES S EM EL MARK
[7]   The challenges of understanding and using security: A survey of end-users [J].
Furnell, SM ;
Jusoh, A ;
Katsabas, D .
COMPUTERS & SECURITY, 2006, 25 (01) :27-35
[8]  
Genic S, 2007, J INF ORGAN SCI, V31, P51
[9]  
Harris Bev., 2004, Black Box Voting: Ballot Tampering in the 2est Century
[10]  
Heinström J, 2003, INFORM RES, V9