Information security has for long time been a field of study in computer science, software engineering, and information communications technology. The term ‘information security’ has recently been replaced with the more generic term cybersecurity. The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers’ social engineering and cognitive hacking methods (i.e., spreading false information). Accordingly, in this paper, we identify current research on psychological traits and individual differences among computer system users that explain vulnerabilities to cyber security attacks ...
Social networking sites often witness various types of social engineering (SE) attacks. Yet, limited...
Social engineering is a growing source of information security concern. Exploits appear to evolve, w...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...
Information security has for long time been a field of study in computer science, software engineeri...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evo...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Cybersecurity threat is one of the major national security challenges confronting the United States,...
There has been a general consensus in the computer security research community that the usability of...
Social networking sites often witness various types of social engineering (SE) attacks. Yet, limited...
Social engineering is a growing source of information security concern. Exploits appear to evolve, w...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...
Information security has for long time been a field of study in computer science, software engineeri...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
A survey of IT professionals suggested that despite technological advancement and organizational pro...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
In cyber-security the weakest link is often seen as the human factor. This has led to discussions ab...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
The chapter presents an overview of emerging issues in the psychology of human behaviour and the evo...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Cybersecurity threat is one of the major national security challenges confronting the United States,...
There has been a general consensus in the computer security research community that the usability of...
Social networking sites often witness various types of social engineering (SE) attacks. Yet, limited...
Social engineering is a growing source of information security concern. Exploits appear to evolve, w...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...