[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review

N Chowdhury, V Gkioulos - Computer Science Review, 2021 - Elsevier
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …

Don't click: towards an effective anti-phishing training. A comparative literature review

D Jampen, G Gür, T Sutter, B Tellenbach - Human-centric Computing and …, 2020 - Springer
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …

Educating and raising awareness on cyber security social engineering: A literature review

H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …

Organizational science and cybersecurity: abundant opportunities for research at the interface

RS Dalal, DJ Howard, RJ Bennett, C Posey… - Journal of business and …, 2022 - Springer
Cybersecurity is an ever-present problem for organizations, but organizational science has
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …

Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception

T Sutter, AS Bozkir, B Gehring, P Berlich - Ieee Access, 2022 - ieeexplore.ieee.org
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Online safety awareness and human factors: An application of the theory of human ecology

T Mohammad, NAM Hussin, MH Husin - Technology in Society, 2022 - Elsevier
Efforts have been made on large and small scales to reduce cybersecurity threats around
the world, including in Malaysia. However, scholars have argued that, in spite of the …

Risk modelling of cyber threats against MIS and ERP applications

A Efe - Pamukkale Üniversitesi İşletme Araştırmaları Dergisi, 2024 - dergipark.org.tr
This study presents a detailed examination of cyber threats impacting Management
Information Systems (MIS) and Enterprise Resource Planning (ERP) applications. It explores …

[HTML][HTML] The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection

D Sturman, EA Bell, JC Auton, GR Breakey… - Applied Ergonomics, 2024 - Elsevier
This study investigated the roles of phishing knowledge, cue utilization, and decision styles
in contributing to phishing email detection. Participants (N= 145) completed an online email …

Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training

DM Hull, SW Schuetz, PB Lowry - Computers & Security, 2023 - Elsevier
Antiphishing training is a critical element of an organization's security posture. Yet, its
effectiveness is often limited by trainees' perception that it is boring and unengaging, which …