As cyberattacks grow ever more sophisticated, those who defend against them are embracing behavioural science and economics to understand both the perpetrators and their victims.
Enjoying our latest content?
Log in or create an account to continue
- Access the most recent journalism from Nature's award-winning team
- Explore the latest features & opinion covering groundbreaking research
or
References
Net Losses: Estimating the Global Cost of Cybercrime (Center for Strategic and International Studies, 2014); available at http://go.nature.com/15nom3
IBM 2015 Cyber Security Intelligence Index (IBM, 2015); available at http://go.nature.com/qcxkux
Bonneau, J., Herley, C., van Oorschot, P. C. & Stajano, F. Proc. IEEE Symp. on Security and Privacy 553–567 (2012).
Steves, M. et al. Report: Authentication Diary Study (National Institute for Standards and Technology, 2014); available at http://dx.doi.org/10.6028/NIST.IR.7983
Kirlappos, I., Parkin, S. & Sasse, M. A. Proc. Workshop on Usable Security http://dx.doi.org/10.14722/usec.2014.23007 (2014).
Shay, R. et al. Symp. Usable Privacy and Security (SOUPS) (2010); available at http://go.nature.com/bwuclr
Ur, B. et al. ;login; 51–57 (December 2012); available at http://go.nature.com/koxdc3
Mazurek, M. L. et al. Proc. 2013 ACM SIGSAC Conf. on Computer & Communications Security 173–186 (2012).
Password Guidance: Simplifying Your Approach (CESG & Centre for the Protection of National Infrastructure, 2015); available at http://go.nature.com/bgxre8
Levchenko, K. et al. Proc. IEEE Symp. on Security and Privacy 431–446 (2011).
Thomas, K. et al. Proc. Workshop on the Economics of Information Security (WEIS) (2015); available at http://go.nature.com/4emecm
McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G. M. & Savage, S. Proc. ACM Conf. on Computer and Communications Security 845–856 (2012).
Author information
Authors and Affiliations
Related links
Related links in Nature Research
Related external links
Rights and permissions
About this article
Cite this article
Waldrop, M. How to hack the hackers: The human side of cybercrime. Nature 533, 164–167 (2016). https://doi.org/10.1038/533164a
Published:
Issue date:
DOI: https://doi.org/10.1038/533164a