CFP last date
22 September 2025
Call for Paper
October Edition
IJCA solicits high quality original research papers for the upcoming October edition of the journal. The last date of research paper submission is 22 September 2025

Submit your paper
Know more
Random Articles
Reseach Article

Human Factors in Cybersecurity: Humans as a Weak Link to Malware Distribution

by Alqarni Sami
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 187 - Number 34
Year of Publication: 2025
Authors: Alqarni Sami
10.5120/ijca2025925564

Alqarni Sami . Human Factors in Cybersecurity: Humans as a Weak Link to Malware Distribution. International Journal of Computer Applications. 187, 34 ( Aug 2025), 94-99. DOI=10.5120/ijca2025925564

@article{ 10.5120/ijca2025925564,
author = { Alqarni Sami },
title = { Human Factors in Cybersecurity: Humans as a Weak Link to Malware Distribution },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2025 },
volume = { 187 },
number = { 34 },
month = { Aug },
year = { 2025 },
issn = { 0975-8887 },
pages = { 94-99 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume187/number34/humans-as-a-weak-link-to-malware-distribution/ },
doi = { 10.5120/ijca2025925564 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-08-22T14:52:00+05:30
%A Alqarni Sami
%T Human Factors in Cybersecurity: Humans as a Weak Link to Malware Distribution
%J International Journal of Computer Applications
%@ 0975-8887
%V 187
%N 34
%P 94-99
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This study investigates the impact of human factors in the context of malware distribution within the organization. Malware is often used to exploit human elements by making use of social engineering techniques. The paper explores the interplay between human elements and malware distribution. The study examines the psychological elements that makes it easier for bad actors to exploit humans into distributing the malware. The analysis of secondary research provides vital insights that will lead to the implementation of effective mitigating strategies. The findings of the selected studies demonstrate the fundamental ground truth. Human factors are the most neglected factors when compared to the technical elements when it comes to implementation of strategies that protect against cybersecurity attacks. The ground truth is supported by the fact that technical defenses are not often targeted because humans are easier to penetrate than the technical aspects. The findings demonstrate the need to implement a multi-approach that integrates technological strategies and gaining an understanding of how human vulnerabilities make it easier for bad actors to use social engineering techniques to distribute malware in a system.

References
  1. J. Edwards, "Malware Defenses. In Critical Security Controls for Effective Cyber Defense: A Comprehensive Guide to CIS 18 Controls.," pp. 277-308, 2024.
  2. F. Ugbebor, O. Aina, M. Abass and D. Kushanu, "Employee cybersecurity awareness training programs customized for SME contexts to reduce human-error related security incidents.," Knowledge Learning and Science Technology, pp. 2959-6386, 2024.
  3. Z. Wang, H. Zhu and L. Sun, "Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods.," pp. 11895-11910., 2021.
  4. F. Lévesque, S. Chiasson, A. Somayaji and J. Fernandez, "Technological and human factors of malware attacks: A computer security clinical trial approach. ACM Transactions on Privacy and Security," 2018.
  5. J. Nurse, "Cybercrime and you: How criminals attack and the human factors that they seek to exploit.," 2018.
  6. S. Nifakos, K. Chandramouli, C. Nikolaou, P. Papachristou, S. Koch, E. Panaousis and S. Bonacina, " Influence of human factors on cyber securitywithin healthcareorganisations: A systematic review," Security Science Journal, vol. 2, 2021.
  7. E. Kadena and M. Gupi, "Human factors in cybersecurity: Risks and impacts.," Security science, vol. 2, pp. 51-64., 2021.
  8. L. Thirupathi, B. Vasundara, D. Sundaragiri, R. Gugulothu and R. Pulyala, "Understanding and Addressing Human Factors in Cybersecurity Vulnerabilities. In Human Impact on Security and Privacy: Network and Human Security, Social Media.," 2025.
  9. G. Ayodele, L. Abdulrahman, J. Alebiosu, G. Egdebion and O. Akinbolajo, "Human-Centric Cybersecurity: Addressing the Human Factor in Cyber Defense Strategies.," 2025.
Index Terms

Computer Science
Information Sciences

Keywords

Malware human behavior vulnerabilities human factors