ISSN

2231-3915 (Online)
2231-3907 (Print)


Author(s): Biraj Das

Email(s): birajdas@gmail.com

DOI: 10.52711/2231-3915.2025.00008   

Address: Biraj Das
APTS, Assam, Guwahati.
*Corresponding Author

Published In:   Volume - 15,      Issue - 1,     Year - 2025


ABSTRACT:
The web of technological prowess and human behavior, the age-old debate of nature versus nurture, as proposed by Sir Francis Galton, finds new relevance in the realm of cybersecurity. Galton's theory, initially posited in the context of human development, suggests that individuals' traits and behaviors are influenced by both innate qualities (nature) and environmental factors (nurture). upbringing and socialization influence human behavior, proper cybersecurity training and awareness programs can empower individuals to recognize and respond effectively to cyber threats. Perpetrators leverage AI-powered tools to launch sophisticated attacks, bypassing traditional security measures and exploiting human vulnerabilities with unprecedented precision.In this context, the nature of cybersecurity is shaped not only by the inherent vulnerabilities in technology but also by the capabilities and intentions of AI-driven adversaries. By embracing this multidimensional perspective and nurturing our cybersecurity awareness and practices, we can navigate the challenges of digital dominance and forge a more secure future for all.


Cite this article:
Biraj Das. Nature Vs. Nurture in Cybersecurity. International Journal of Technology. 2025; 15(1):43-5. doi: 10.52711/2231-3915.2025.00008

Cite(Electronic):
Biraj Das. Nature Vs. Nurture in Cybersecurity. International Journal of Technology. 2025; 15(1):43-5. doi: 10.52711/2231-3915.2025.00008   Available on: https://www.ijtonline.com/AbstractView.aspx?PID=2025-15-1-8


REFERENCE: 
1.    Aksoy, C. Building A cyber security culture for resilient organizations against cyber attacks. İşletme Ekonomi ve Yönetim Araştırmaları Dergisi. 2024; 7 (1): 96-110.
2.    Aksoy, C. Building A cyber security culture for resilient organizations against cyber attacks. İşletme Ekonomi ve Yönetim Araştırmaları Dergisi. 2024; 7 (1): 96-110.
3.    Beaunoyer, E, and M. J Guitton. Cyberthanathology: Death and beyond in the digital age. Computers in Human Behavior. 2021; 122: 106849.
4.    Bird, D. A, ed. Real-time and retrospective analyses of cyber security. IGI Global. 2020
5.    Blauth, T. F, O. J Gstrein, and A Zwitter. Artificial intelligence crime: An overview of malicious use and abuse of AI. IEEE Access. 2022; 10: 77110-77122.
6.    Bonfanti, M. E. Artificial intelligence and the offence-defence balance in cyber security. Cyber Security: Socio-Technological Uncertainty and Political Fragmentation. (Routledge). 2022: 64-79.
7.    Camp, L. J, M Grobler, J Jang-Jaccard, C Probst, K Renaud, and P Watters. Measuring human resilience in the face of the global epidemiology of cyber attacks. https://scholarspace.manoa.hawaii.edu/items/7ecffbc0-90da-42fd-9377-6f025f7f6127. 2019
8.    Carlo, A, N P Mantı, B A S WAM, F Casamassima, N Boschetti, P Breda, and T Rahloff. The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications. Journal of Space Safety Engineering. 2023; 10(4): 47.
9.    Carlo, A, N. P Mantı, B. A. S WAM, F Casamassima, N Boschetti, P Breda, and T Rahloff. The importance of cybersecurity frameworks to regulate emergent AI technologies for space applications. Journal of Space Safety Engineering. 2023; 10 (4): 47.
10.    Chatterjee, D. Cybersecurity readiness: a holistic and high-performance approach. SAGE Publications. 2021
11.    Chowdhury, N. H, M. T Adam, and T Teubner. Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. Computers & Security. 2020; 97: 101963.
12.    Chukwu, E, A Adu-Baah, M Niaz, U Nwagwu, and M. U Chukwu. Navigating ethical supply chains: the intersection of diplomatic management and theological ethics. International Journal of Multidisciplinary Sciences and Arts. 2023; 2 (1): 127-139.
13.    Dowd, M, J McDonald, and J Schuh. The art of software security assessment: Identifying and preventing software vulnerabilities. . Pearson Education. 2006
14.    Galton, F.. English Men of Science: Their Nature and Nurture. . Routledge. 2018
15.    Havens, K. G. Borders without boundaries: An analysis of cybersecurity policy and changing notions of sovereignty. Doctoral dissertation, Utica: Utica College. 2014
16.    Laksana, T. G, and T. S. Lestari. Healthy Internet: a Legal Model for Cybersecurity in Information Technology.  Yayasan Pendidikan Cendekia Muslim. 2024
17.    Moses, S, and D. C Rowe. Physical security and cybersecurity: Reducing risk by enhancing physical security posture through multi-factor authentication and other techniques. International Journal for Information Security Research (IJISR). 2016; 6 (2): 667.
18.    Paliwala, A. Netizenship, security and freedom. International Review of Law, Computers & Technology. 2013; 27 (1-2): 104-123.
19.    Rader, E, and R Wash. Identifying patterns in informal sources of security information.  Journal of Cybersecurity. 2015; 1 (1): 121-144.
20.    Ravindran, A. Will AI Dictate the Future?.  Marshall Cavendish International Asia Pte Ltd. 2022
21.    Ronchi, A. M. E-citizens: Toward a new model of (inter) active citizenry. Springer. 2019
22.    Safitra, M. F, M Lubis, and H Fakhrurroja. Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability. 2023; 16 (18): 13369.
23.    Trend, D. Elsewhere in America: The Crisis of Belonging in Contemporary Culture. Routledge. 2016
24.    Trim, P, and D Upton. Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge. 2016
25.    Trim, P, and Y. I Lee. Cyber security management: a governance, risk and compliance framework. Routledge. 2016
26.    Vadiyala, V. R. Innovative Frameworks for Next-Generation Cybersecurity: Enhancing Digital Protection Strategies. Technology & Management Review. 2019; 4: 8-22.
27.    Wambui, B. M, H Nyambura, and N. Daniel. A Survey of Cyber Crime Awareness Among Netizens of Higher Education Institutions: A Case Study of Zetech University. 2022
28.    Watts, J, B Jensen, J. D Work, C Whyte, and N Kollars. Alternate Cybersecurity Futures. Atlantic Council. 2019
29.    Yaseen, A. AI-Driven threat detection and response: A paradigm shift in cybersecurity. International Journal of Information and Cybersecurity. 2023; 7 (12): 25-43.
30.    Zimmermann, V, and K Renaud. Moving from a ‘human-as-problem to a human-as-solution cybersecurity mindset. International Journal of Human-Computer Studies. 2019; 131: 169-187.
31.    Zio, E. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliability Engineering & System Safety. 2016; 152: 137-150.

Recomonded Articles:

Author(s): Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav

DOI: 10.5958/2231-3915.2020.00016.4         Access: Open Access Read More

Author(s): Siddharth Nayak, Shivani Verma, Deepak Kumar Deshmukh

DOI: 10.5958/2231-3915.2020.00025.5         Access: Open Access Read More

Author(s): Yuvaraj S K, Pooja Prakash Kanoor, Akshay Siddeshwar Nikhade, Ratri Parida, Jeetu Soneji

DOI: 10.5958/2231-3915.2015.00044.9         Access: Open Access Read More

Author(s): Manoj Kumar Chande, Rajlaxmi Gupta, Shailesh Dhar Diwan

DOI: 10.5958/2231-3915.2020.00018.8         Access: Open Access Read More

Author(s): Digeshwar Prasad Sahu, Yamini Sahu, Swati Jain

DOI: 10.5958/2231-3915.2020.00020.6         Access: Open Access Read More

Author(s): Neeraj Kumar Nage, Devendra Chaphekar

DOI: 10.5958/2231-3915.2020.00014.0         Access: Open Access Read More

Author(s): Manish Kumar, Chinmay Chandrakar

DOI:         Access: Open Access Read More

Author(s): Saurabh Shete, Ganesh Taware, Shrikrishna Baokar, Santosh Undare

DOI: 10.5958/2231-3915.2019.00004.X         Access: Open Access Read More

Author(s): Vidya Nanda Hruday Pidikiti

DOI: 10.5958/2231-3915.2016.00005.5         Access: Open Access Read More

Author(s): Nisha Tikariha Vaishnav, Snehlata Barde

DOI: 10.5958/2231-3915.2020.00005.X         Access: Open Access Read More

Author(s): Mohammed Bakhtawar Ahmed, Sandeep Gonnade, Deepak Xaxa

DOI: 10.5958/2231-3915.2016.00001.8         Access: Open Access Read More

Author(s): Jyoti Prakash*, Virender Singh, Shweta Manan, Vinod Kumar**

DOI:         Access: Open Access Read More

Author(s): Jyoti Prakash, Sanjay Kumar Gupta, Renu Bala, Kanu Vaid

DOI:         Access: Open Access Read More

International Journal of Technology (IJT) is an international, peer-reviewed journal, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology...... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2231-3915 


Recent Articles




Tags