Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences

V Švábenský, J Vykopal, P Čeleda - Proceedings of the 51st ACM …, 2020 - dl.acm.org
Cybersecurity is now more important than ever, and so is education in this field. However,
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …

[HTML][HTML] From cobit to iso 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models

TR McIntosh, T Susnjak, T Liu, P Watters, D Xu… - Computers & …, 2024 - Elsevier
This study investigated the integration readiness of four predominant cybersecurity
Governance, Risk and Compliance (GRC) frameworks–NIST CSF 2.0, COBIT 2019, ISO …

How do Older Adults feel about engaging with Cyber‐Security?

B Morrison, L Coventry, P Briggs - Human behavior and …, 2021 - Wiley Online Library
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …

The evolving menace of ransomware: A comparative analysis of pre-pandemic and mid-pandemic attacks

M Lang, L Connolly, P Taylor, PJ Corner - Digital Threats: Research and …, 2023 - dl.acm.org
Drawing upon direct interviews and secondary sources, this article presents a qualitative
comparative analysis of 39 ransomware attacks, 26 of which occurred shortly before the …

[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice

B Dupont, C Shearing, M Bernier, R Leukfeldt - Computers & security, 2023 - Elsevier
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …

Ransomware: Analysing the impact on Windows active directory domain services

G McDonald, P Papadopoulos, N Pitropakis, J Ahmad… - Sensors, 2022 - mdpi.com
Ransomware has become an increasingly popular type of malware across the past decade
and continues to rise in popularity due to its high profitability. Organisations and enterprises …

Participatory threat modelling: Exploring paths to reconfigure cybersecurity

J Slupska, SD Dawson Duckworth, L Ma… - extended abstracts of the …, 2021 - dl.acm.org
We present “participatory threat modelling” as a feminist cybersecurity practice which allows
technology research to centre traditionally marginalized and excluded experiences. We …

What Motivates and Discourages Employees in Phishing Interventions: An Exploration of {Expectancy-Value} Theory

X Chen, S Doublet, A Sergeeva, G Lenzini… - … Symposium on Usable …, 2024 - usenix.org
Organizations adopt a combination of measures to defend against phishing attacks that pass
through technical filters. However, employees' engagement with these countermeasures …

Understanding the security and privacy implications of online toxic content on refugees

A Arunasalam, H Farrukh, E Tekcan… - 33rd USENIX Security …, 2024 - usenix.org
Deteriorating conditions in regions facing social and political turmoil have resulted in the
displacement of huge populations known as refugees. Technologies such as social media …