[图书][B] Applied attention theory

CD Wickens, JS McCarley, RS Gutzwiller - 2022 - taylorfrancis.com
Applied Attention Theory, Second Edition provides details concerning the relevance of all
aspects of attention to the world beyond the laboratory. Topic application areas include the …

[PDF][PDF] Botching human factors in cybersecurity in business organizations

C Nobles - HOLISTICA–Journal of Business and Public …, 2018 - sciendo.com
Human factors remained unexplored and underappreciated in information security. The
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …

The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals

KS Jones, AS Namin, ME Armstrong - ACM Transactions on Computing …, 2018 - dl.acm.org
Our cybersecurity workforce needs surpass our ability to meet them. These needs could be
mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities …

Human factors in cybersecurity: Issues and challenges in big data

X Zhang, AA Ghorbani - … Anthology on Privatizing and Securing Data, 2021 - igi-global.com
Over recent years, the extensive development of information technology has dramatically
advanced the way that people use the internet. The fast growth of the internet of things and …

Observing cyber security incident response: qualitative themes from field research

M Nyre-Yu, RS Gutzwiller… - Proceedings of the …, 2019 - journals.sagepub.com
Cyber security increasingly focuses on the challenges faced by network defenders. Cultural
and security-driven sentiments about external observation, as well as publication concerns …

A review of cyber vigilance tasks for network defense

OA Guidetti, C Speelman, P Bouhlas - Frontiers in Neuroergonomics, 2023 - frontiersin.org
The capacity to sustain attention to virtual threat landscapes has led cyber security to
emerge as a new and novel domain for vigilance research. However, unlike classic …

An intelligent multi-stage model for countering the impact of disinformation on the cybersecurity system

M Kryshtanovych, N Lyubomudrova, H Bondar… - 2023 - dspace.chmnu.edu.ua
The main purpose of the paper is to form an intelligent multi-stage model for counteracting
the negative impact of disinformation on the cybersecurity system. The research …

Cybersecurity training in Norwegian critical infrastructure companies

N Chowdhury, E Nystad, K Reegård, V Gkioulos - 2022 - ntnuopen.ntnu.no
Human preparedness is a critical aspect of critical infrastructure (CI) cybersecurity. Many
efforts, including educational curricula and training programs, have been taken at both …

Knowledge, skills, and abilities for specialized curricula in cyber defense: Results from interviews with cyber professionals

ME Armstrong, KS Jones, AS Namin… - ACM Transactions on …, 2020 - dl.acm.org
More specialized cybersecurity education programs are needed to address workforce
needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We …

What Influences People's Adoption of Cognitive Cybersecurity?

C Tam, M Balau, T Oliveira - International Journal of Human …, 2024 - Taylor & Francis
Artificial intelligence (AI) and big data, among other new technologies, have attracted the
attention and interest of practitioners and researchers in cognitive cybersecurity regarding …