Digital hoarding behaviours: Implications for cybersecurity

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Citations (Scopus)

Abstract

This chapter will firstly describe the key characteristics of hoarding disorder. It will then explain the term ‘digital hoarding’ and provide examples and a case study. It will then link digital hoarding behaviours with relevant aspects of personal information management and explain how such behaviours may have negative impacts on an organization, particularly in relation to cybersecurity. It will then draw on the recent studies conducted by our research team exploring how to measure digital hoarding and how people think about their digital behaviours in relation to their personal and work files, with particular reference to e-mails. The chapter will end by providing some suggestions as to how an individual and an organization may be able to reduce or at least better control their digital hoarding behaviours and thus improve their cybersecurity.

Original languageEnglish
Title of host publicationCyber Influence and Cognitive Threats
PublisherElsevier
Pages77-95
Number of pages19
ISBN (Electronic)9780128192047
ISBN (Print)9780128192054
DOIs
Publication statusPublished - 1 Jan 2019

Fingerprint

Dive into the research topics of 'Digital hoarding behaviours: Implications for cybersecurity'. Together they form a unique fingerprint.

Cite this