{"title":"Digital Identity: A Human-Centered Risk Awareness Study","authors":"Tom Chebib","doi":"10.28945/4826","DOIUrl":null,"url":null,"abstract":"Cybersecurity breaches have been at the forefront of most news outlets, recently. People’s Digital Identity has been at the epicenter of cybersecurity breaches. Defining the composition of digital identity is the first step at risk identification and the first step towards risk mitigation. Cybersecurity risk management tools are lacking in user-centricity. Organizations like the National Institute of Standards and Technology have to craft user-centric personal cybersecurity risk management frameworks.","PeriodicalId":234535,"journal":{"name":"Muma Business Review","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Muma Business Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28945/4826","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cybersecurity breaches have been at the forefront of most news outlets, recently. People’s Digital Identity has been at the epicenter of cybersecurity breaches. Defining the composition of digital identity is the first step at risk identification and the first step towards risk mitigation. Cybersecurity risk management tools are lacking in user-centricity. Organizations like the National Institute of Standards and Technology have to craft user-centric personal cybersecurity risk management frameworks.