ABSTRACT:
The web of technological prowess and human behavior, the age-old debate of nature versus nurture, as proposed by Sir Francis Galton, finds new relevance in the realm of cybersecurity. Galton's theory, initially posited in the context of human development, suggests that individuals' traits and behaviors are influenced by both innate qualities (nature) and environmental factors (nurture). upbringing and socialization influence human behavior, proper cybersecurity training and awareness programs can empower individuals to recognize and respond effectively to cyber threats. Perpetrators leverage AI-powered tools to launch sophisticated attacks, bypassing traditional security measures and exploiting human vulnerabilities with unprecedented precision.In this context, the nature of cybersecurity is shaped not only by the inherent vulnerabilities in technology but also by the capabilities and intentions of AI-driven adversaries. By embracing this multidimensional perspective and nurturing our cybersecurity awareness and practices, we can navigate the challenges of digital dominance and forge a more secure future for all.
Cite this article:
Biraj Das. Nature Vs. Nurture in Cybersecurity. International Journal of Technology. 2025; 15(1):43-5. doi: 10.52711/2231-3915.2025.00008
Cite(Electronic):
Biraj Das. Nature Vs. Nurture in Cybersecurity. International Journal of Technology. 2025; 15(1):43-5. doi: 10.52711/2231-3915.2025.00008 Available on: https://www.ijtonline.com/AbstractView.aspx?PID=2025-15-1-8
REFERENCE:
1. Aksoy, C. Building A cyber security culture for resilient organizations against cyber attacks. İşletme Ekonomi ve Yönetim Araştırmaları Dergisi. 2024; 7 (1): 96-110.
2. Aksoy, C. Building A cyber security culture for resilient organizations against cyber attacks. İşletme Ekonomi ve Yönetim Araştırmaları Dergisi. 2024; 7 (1): 96-110.
3. Beaunoyer, E, and M. J Guitton. Cyberthanathology: Death and beyond in the digital age. Computers in Human Behavior. 2021; 122: 106849.
4. Bird, D. A, ed. Real-time and retrospective analyses of cyber security. IGI Global. 2020
5. Blauth, T. F, O. J Gstrein, and A Zwitter. Artificial intelligence crime: An overview of malicious use and abuse of AI. IEEE Access. 2022; 10: 77110-77122.
6. Bonfanti, M. E. Artificial intelligence and the offence-defence balance in cyber security. Cyber Security: Socio-Technological Uncertainty and Political Fragmentation. (Routledge). 2022: 64-79.
7. Camp, L. J, M Grobler, J Jang-Jaccard, C Probst, K Renaud, and P Watters. Measuring human resilience in the face of the global epidemiology of cyber attacks. https://scholarspace.manoa.hawaii.edu/items/7ecffbc0-90da-42fd-9377-6f025f7f6127. 2019
8. Carlo, A, N P Mantı, B A S WAM, F Casamassima, N Boschetti, P Breda, and T Rahloff. The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications. Journal of Space Safety Engineering. 2023; 10(4): 47.
9. Carlo, A, N. P Mantı, B. A. S WAM, F Casamassima, N Boschetti, P Breda, and T Rahloff. The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications. Journal of Space Safety Engineering. 2023; 10 (4): 47.
10. Chatterjee, D. Cybersecurity readiness: a holistic and high-performance approach. SAGE Publications. 2021
11. Chowdhury, N. H, M. T Adam, and T Teubner. Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. Computers & Security. 2020; 97: 101963.
12. Chukwu, E, A Adu-Baah, M Niaz, U Nwagwu, and M. U Chukwu. Navigating ethical supply chains: the intersection of diplomatic management and theological ethics. International Journal of Multidisciplinary Sciences and Arts. 2023; 2 (1): 127-139.
13. Dowd, M, J McDonald, and J Schuh. The art of software security assessment: Identifying and preventing software vulnerabilities. . Pearson Education. 2006
14. Galton, F.. English Men of Science: Their Nature and Nurture. . Routledge. 2018
15. Havens, K. G. Borders without boundaries: An analysis of cybersecurity policy and changing notions of sovereignty. Doctoral dissertation, Utica: Utica College. 2014
16. Laksana, T. G, and T. S. Lestari. Healthy Internet: a Legal Model for Cybersecurity in Information Technology. Yayasan Pendidikan Cendekia Muslim. 2024
17. Moses, S, and D. C Rowe. Physical security and cybersecurity: Reducing risk by enhancing physical security posture through multi-factor authentication and other techniques. International Journal for Information Security Research (IJISR). 2016; 6 (2): 667.
18. Paliwala, A. Netizenship, security and freedom. International Review of Law, Computers & Technology. 2013; 27 (1-2): 104-123.
19. Rader, E, and R Wash. Identifying patterns in informal sources of security information. Journal of Cybersecurity. 2015; 1 (1): 121-144.
20. Ravindran, A. Will AI Dictate the Future?. Marshall Cavendish International Asia Pte Ltd. 2022
21. Ronchi, A. M. E-citizens: Toward a new model of (inter) active citizenry. Springer. 2019
22. Safitra, M. F, M Lubis, and H Fakhrurroja. Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability. 2023; 16 (18): 13369.
23. Trend, D. Elsewhere in America: The Crisis of Belonging in Contemporary Culture. Routledge. 2016
24. Trim, P, and D Upton. Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge. 2016
25. Trim, P, and Y. I Lee. Cyber security management: a governance, risk and compliance framework. Routledge. 2016
26. Vadiyala, V. R. Innovative Frameworks for Next-Generation Cybersecurity: Enhancing Digital Protection Strategies. Technology & Management Review. 2019; 4: 8-22.
27. Wambui, B. M, H Nyambura, and N. Daniel. A Survey of Cyber Crime Awareness Among Netizens of Higher Education Institutions: A Case Study of Zetech University. 2022
28. Watts, J, B Jensen, J. D Work, C Whyte, and N Kollars. Alternate Cybersecurity Futures. Atlantic Council. 2019
29. Yaseen, A. AI-Driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity. 2023; 7 (12): 25-43.
30. Zimmermann, V, and K Renaud. Moving from a ‘human-as-problem to a human-as-solution cybersecurity mindset. International Journal of Human-Computer Studies. 2019; 131: 169-187.
31. Zio, E. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliability Engineering & System Safety. 2016; 152: 137-150.