Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
[HTML][HTML] The whole of cyber defense: Syncing practice and theory
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
Using design-science based gamification to improve organizational security training and compliance
We conducted a design-science research project to improve an organization's compound
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …
problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal …
[HTML][HTML] Exploring susceptibility to phishing in the workplace
Phishing emails provide a means to infiltrate the technical systems of organisations by
encouraging employees to click on malicious links or attachments. Despite the use of …
encouraging employees to click on malicious links or attachments. Despite the use of …
Hope, tolerance and empathy: employees' emotions when using an AI-enabled chatbot in a digitalised workplace
Purpose Information Systems research on emotions in relation to using technology largely
holds essentialist assumptions about emotions, focuses on negative emotions and treats …
holds essentialist assumptions about emotions, focuses on negative emotions and treats …
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …
of security and privacy research. We discuss the need to re-examine our understanding of …
Stress, burnout, and security fatigue in cybersecurity: A human factors problem
C Nobles - HOLISTICA–Journal of Business and Public …, 2022 - sciendo.com
Stress, burnout, and security fatigue continue as slight destroyers of strong cybersecurity
and significant human factors concerns. The persistence of these human performance …
and significant human factors concerns. The persistence of these human performance …
Impact of big data analytics and ChatGPT on cybersecurity
Every day, network assaults and cyber threats get more sophisticated, and the worldwide
number of attacks increases, as do the approaches and methods used to infiltrate business …
number of attacks increases, as do the approaches and methods used to infiltrate business …
Resistance to facial recognition payment in China: The influence of privacy-related factors
As mobile payment technology is at a nascent stage, the use of facial recognition payment
(FRP) services is gradually penetrating the lives of Chinese people. Although the FRP …
(FRP) services is gradually penetrating the lives of Chinese people. Although the FRP …
Eyes wide open: The role of situational information security awareness for security‐related behaviour
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …
examining security‐related behaviours. We take a more dynamic, situational and …