A review of the literature on the metaverse: definition, technologies, and user behaviors
Z Zhou, Z Chen, XL ** - Internet Research, 2024 - emerald.com
Purpose As a sociotechnical system, the metaverse has sparked heated discussion.
However, concerns abound that the concept is “old wine in a new bottle” used for capital …
However, concerns abound that the concept is “old wine in a new bottle” used for capital …
[HTML][HTML] Exploring the evidence for email phishing training: A sco** review
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …
information. To mitigate this risk, a range of training measures have been developed to …
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in develo** …
and awareness. However, there is lack of theoretical underpinnings in develo** …
Organizational learning from cybersecurity performance: Effects on cybersecurity investment decisions
IS literature has identified various economic, performance, and environmental factors
affecting cybersecurity investment decisions. However, economic modeling approaches …
affecting cybersecurity investment decisions. However, economic modeling approaches …
[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
through deception. Phishing attacks are often aided by carefully crafted phishing emails …
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training
With government and industry experiencing a critical shortage of trained cybersecurity
professionals, organisations are spearheading various training programs to cultivate …
professionals, organisations are spearheading various training programs to cultivate …
Evaluation of contextual and game-based training for phishing detection
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on
the individual user. The individual user is expected to engage in secure behavior by …
the individual user. The individual user is expected to engage in secure behavior by …
[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …
highlight their inevitability and the impossibility of completely protecting the integrity of …
Unveiling motivational configurations in sha** meaningful engagement in green gamification
Z Zhou, Z Chen, XL **, Z Yuan - European Journal of Information …, 2024 - Taylor & Francis
Green gamification embeds game elements into non-game green information systems to
tackle environmental degradation by encouraging pro-environmental behaviours. However …
tackle environmental degradation by encouraging pro-environmental behaviours. However …
[HTML][HTML] Design principles for cognitively accessible cybersecurity training
Exploiting human behavior to gain unauthorized access to computer systems has become
common practice for modern cybercriminals. Users are expected to adopt secure behavior to …
common practice for modern cybercriminals. Users are expected to adopt secure behavior to …