Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical support for users comes from Information Security Awareness Training (ISAT), which makes the effectiveness of ISAT a key cybersecurity issue. This paper presents an evaluation of how two promising methods for ISAT support users in acheiving secure behavior using a simulated experiment with 41 participants. The methods were game-based training, where users learn by playing a game, and Context-Based Micro-Training (CBMT), where users are presented with short information in a situation where t...
Machine learning has been described as an effective measure in avoiding most cyberattacks. The devel...
Phishing is a major cyber threat to organizations that can cause financial and reputational damage, ...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sit...
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the ...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
Phishing attacks are challenging to detect and can have severe consequences. For example, in 2020 al...
Phishing is a growing problem. Most current research about mitigating damages from or preventing suc...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Malicious web content includes phishing emails, social media posts, and websites that imitate legiti...
This research addresses the human aspect of cybersecurity by developing a method for cybersecurity t...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
Email is of critical importance as a communication channel for both business and personal matters. U...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sit...
Machine learning has been described as an effective measure in avoiding most cyberattacks. The devel...
Phishing is a major cyber threat to organizations that can cause financial and reputational damage, ...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sit...
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the ...
The digital transformation of the 21st century has led to a series of new possibilities and challeng...
Phishing attacks are challenging to detect and can have severe consequences. For example, in 2020 al...
Phishing is a growing problem. Most current research about mitigating damages from or preventing suc...
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Malicious web content includes phishing emails, social media posts, and websites that imitate legiti...
This research addresses the human aspect of cybersecurity by developing a method for cybersecurity t...
Operating systems and programmes are more protected these days and attackers have shifted their atte...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
Email is of critical importance as a communication channel for both business and personal matters. U...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sit...
Machine learning has been described as an effective measure in avoiding most cyberattacks. The devel...
Phishing is a major cyber threat to organizations that can cause financial and reputational damage, ...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sit...