Security challenges in industry 4.0 plc systems

J Hajda, R Jakuszewski, S Ogonowski - Applied Sciences, 2021 - mdpi.com
The concept of the fourth industrial revolution assumes the integration of people and digitally
controlled machines with the Internet and information technologies. At the end of 2015, more …

Planning for Cyber Security in Schools: The Human Factor.

MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …

Cybersecurity training acceptance: A literature review

J Kävrestad, W Fallatah, S Furnell - International symposium on human …, 2023 - Springer
User behavior is widely acknowledged as a crucial part of cybersecurity, and training is the
most commonly suggested way of ensuring secure behavior. However, an open challenge is …

[HTML][HTML] Design principles for cognitively accessible cybersecurity training

J Kävrestad, J Rambusch, M Nohlberg - Computers & Security, 2024 - Elsevier
Exploiting human behavior to gain unauthorized access to computer systems has become
common practice for modern cybercriminals. Users are expected to adopt secure behavior to …

User perception of Context-Based Micro-Training–a method for cybersecurity training

J Kävrestad, S Furnell, M Nohlberg - Information Security Journal …, 2024 - Taylor & Francis
User behavior is one of the biggest challenges to cybersecurity in modern organizations.
Users are continuously targeted by attackers and required to have sufficient knowledge to …

A taxonomy of SETA methods and linkage to delivery preferences

J Kävrestad, M Nohlberg, S Furnell - ACM SIGMIS Database: the …, 2023 - dl.acm.org
Cybersecurity threats targeting users are common in today's information systems. Threat
actors exploit human behavior to gain unauthorized access to systems and data. The …

A socio-technical and co-evolutionary framework for reducing human-related risks in cyber security and cybercrime ecosystems

T Islam, I Becker, R Posner, P Ekblom… - … on Dependability in …, 2019 - Springer
The focus on cyber security as an interaction between technical elements and humans has
typically confined consideration of the latter to practical issues of implementation …

Context-Based Micro-Training: Enhancing cybersecurity training for end-users

J Kävrestad - 2022 - diva-portal.org
This research addresses the human aspect of cybersecurity by develo** a method for
cybersecurity training of end-users. The reason for addressing that area is that human …

ContextBased MicroTraining: A framework for information security training

J Kävrestad, M Nohlberg - Human Aspects of Information Security and …, 2020 - Springer
This paper address the emergent need for training measures designed to improve user
behavior in regards to security. We do this by proposing a framework for information security …

Evaluation strategies for cybersecurity training methods: a literature review

J Kävrestad, M Nohlberg - Human Aspects of Information Security and …, 2021 - Springer
The human aspect of cybersecurity continues to present challenges to researchers and
practitioners worldwide. While measures are being taken to improve the situation, a vast …