Humans are and have been the weakest link in the cybersecurity chain (e.g., [1, 2, 3]). Not all systems are adequately protected and even for those that are, individuals can still fall prey to cyber-attack attempts (e.g., phishing, malware, ransomware) that occasionally break through, and/or engage in other cyber risky behaviors (e.g., not adequately securing devices) that put even the most secure systems at risk. Such susceptibility can be due to one or a number of factors, including individual differences, environmental factors, maladaptive behaviors, and influence techniques. This is particularly concerning at an organizational level where the costs of a successful cyber-attack can be colossal (e.g., financial, safety, reputational). Cyb...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Humans are and have been the weakest link in the cybersecurity chain (e.g., [1, 2, 3]). Not all syst...
Humans are and have been the weakest link in the cybersecurity chain (e.g., [1, 2, 3]). Not all syst...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
The issue of cybersecurity has become much more prevalent over the last few years, with a number of ...
The issue of cybersecurity has become much more prevalent over the last few years, with a number of ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...
Almost 60% of the world’s population has access to the internet and most organisations today rely on...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
The hyper-connected environment of today has resulted in a substantial boost in productivity, effici...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Humans are and have been the weakest link in the cybersecurity chain (e.g., [1, 2, 3]). Not all syst...
Humans are and have been the weakest link in the cybersecurity chain (e.g., [1, 2, 3]). Not all syst...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
Human factors remained unexplored and underappreciated in information security. The mounting cyber-a...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
The issue of cybersecurity has become much more prevalent over the last few years, with a number of ...
The issue of cybersecurity has become much more prevalent over the last few years, with a number of ...
This paper sets out an argument that cyber-security needs to be thought of as an inherently socio-te...
2015 - 2016Recent security breaches showed that every attack begins with the involvement of users an...
Almost 60% of the world’s population has access to the internet and most organisations today rely on...
With computers being a standard part of life now with the evolution of the internet, many aspects of...
The hyper-connected environment of today has resulted in a substantial boost in productivity, effici...
Currently, the majority of international economic, commercial, cultural, social, and governmental co...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...
Over the years, many cybersecurity breaches have been attributed to human error, considering human f...