The chapter presents an overview of emerging issues in the psychology of human behaviour and the evolving nature of cyber threats. It reflects on the role of social engineering as the entry point of many sophisticated attacks and highlights the relevance of the human element as the starting point of implementing cyber security programmes in organisations as well as securing individual online behaviour. Issues associated with the emerging trends in human behaviour research and ethics are presented for further discussion. The chapter concludes with a set of open research questions warranting immediate academic attention to avoid the exponential growth of information breaches in the future
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evo...
This chapter presents an overview of emerging issues in the psychology of human behaviour and the ev...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
This article seeks to gain a better understanding of how to address some of the challenges in the di...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Information security has for long time been a field of study in computer science, software engineeri...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
The online environment has become a significant focus of the everyday behaviour and activities of in...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Information security has for long time been a field of study in computer science, software engineeri...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evo...
This chapter presents an overview of emerging issues in the psychology of human behaviour and the ev...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
This article seeks to gain a better understanding of how to address some of the challenges in the di...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Information security has for long time been a field of study in computer science, software engineeri...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
The online environment has become a significant focus of the everyday behaviour and activities of in...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Information security has for long time been a field of study in computer science, software engineeri...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...