A review of the literature on the metaverse: definition, technologies, and user behaviors

Z Zhou, Z Chen, XL ** - Internet Research, 2024 - emerald.com
Purpose As a sociotechnical system, the metaverse has sparked heated discussion.
However, concerns abound that the concept is “old wine in a new bottle” used for capital …

[HTML][HTML] Exploring the evidence for email phishing training: A sco** review

N Marshall, D Sturman, JC Auton - Computers & Security, 2024 - Elsevier
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model

NF Khan, N Ikram, H Murtaza, M Javed - Computers & Security, 2023 - Elsevier
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in develo** …

Organizational learning from cybersecurity performance: Effects on cybersecurity investment decisions

FA Shaikh, M Siponen - Information Systems Frontiers, 2024 - Springer
IS literature has identified various economic, performance, and environmental factors
affecting cybersecurity investment decisions. However, economic modeling approaches …

[HTML][HTML] A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness

O Sarker, A Jayatilaka, S Haggag, C Liu… - Journal of Systems and …, 2024 - Elsevier
Background: Phishing is a malicious attempt by cyber attackers to steal personal information
through deception. Phishing attacks are often aided by carefully crafted phishing emails …

That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training

HJ Kam, DK Ormond, P Menard… - Information Systems …, 2022 - Wiley Online Library
With government and industry experiencing a critical shortage of trained cybersecurity
professionals, organisations are spearheading various training programs to cultivate …

Evaluation of contextual and game-based training for phishing detection

J Kävrestad, A Hagberg, M Nohlberg, J Rambusch… - Future Internet, 2022 - mdpi.com
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on
the individual user. The individual user is expected to engage in secure behavior by …

[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice

B Dupont, C Shearing, M Bernier, R Leukfeldt - Computers & security, 2023 - Elsevier
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …

Unveiling motivational configurations in sha** meaningful engagement in green gamification

Z Zhou, Z Chen, XL **, Z Yuan - European Journal of Information …, 2024 - Taylor & Francis
Green gamification embeds game elements into non-game green information systems to
tackle environmental degradation by encouraging pro-environmental behaviours. However …

[HTML][HTML] Design principles for cognitively accessible cybersecurity training

J Kävrestad, J Rambusch, M Nohlberg - Computers & Security, 2024 - Elsevier
Exploiting human behavior to gain unauthorized access to computer systems has become
common practice for modern cybercriminals. Users are expected to adopt secure behavior to …