[图书][B] Applied attention theory
CD Wickens, JS McCarley, RS Gutzwiller - 2022 - taylorfrancis.com
Applied Attention Theory, Second Edition provides details concerning the relevance of all
aspects of attention to the world beyond the laboratory. Topic application areas include the …
aspects of attention to the world beyond the laboratory. Topic application areas include the …
[PDF][PDF] Botching human factors in cybersecurity in business organizations
C Nobles - HOLISTICA–Journal of Business and Public …, 2018 - sciendo.com
Human factors remained unexplored and underappreciated in information security. The
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …
The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals
Our cybersecurity workforce needs surpass our ability to meet them. These needs could be
mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities …
mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities …
Human factors in cybersecurity: Issues and challenges in big data
X Zhang, AA Ghorbani - … Anthology on Privatizing and Securing Data, 2021 - igi-global.com
Over recent years, the extensive development of information technology has dramatically
advanced the way that people use the internet. The fast growth of the internet of things and …
advanced the way that people use the internet. The fast growth of the internet of things and …
Observing cyber security incident response: qualitative themes from field research
M Nyre-Yu, RS Gutzwiller… - Proceedings of the …, 2019 - journals.sagepub.com
Cyber security increasingly focuses on the challenges faced by network defenders. Cultural
and security-driven sentiments about external observation, as well as publication concerns …
and security-driven sentiments about external observation, as well as publication concerns …
A review of cyber vigilance tasks for network defense
OA Guidetti, C Speelman, P Bouhlas - Frontiers in Neuroergonomics, 2023 - frontiersin.org
The capacity to sustain attention to virtual threat landscapes has led cyber security to
emerge as a new and novel domain for vigilance research. However, unlike classic …
emerge as a new and novel domain for vigilance research. However, unlike classic …
An intelligent multi-stage model for countering the impact of disinformation on the cybersecurity system
M Kryshtanovych, N Lyubomudrova, H Bondar… - 2023 - dspace.chmnu.edu.ua
The main purpose of the paper is to form an intelligent multi-stage model for counteracting
the negative impact of disinformation on the cybersecurity system. The research …
the negative impact of disinformation on the cybersecurity system. The research …
Cybersecurity training in Norwegian critical infrastructure companies
Human preparedness is a critical aspect of critical infrastructure (CI) cybersecurity. Many
efforts, including educational curricula and training programs, have been taken at both …
efforts, including educational curricula and training programs, have been taken at both …
Knowledge, skills, and abilities for specialized curricula in cyber defense: Results from interviews with cyber professionals
More specialized cybersecurity education programs are needed to address workforce
needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We …
needs, but it is unclear which knowledge, skills, and abilities (KSAs) fulfil industry needs. We …
What Influences People's Adoption of Cognitive Cybersecurity?
C Tam, M Balau, T Oliveira - International Journal of Human …, 2024 - Taylor & Francis
Artificial intelligence (AI) and big data, among other new technologies, have attracted the
attention and interest of practitioners and researchers in cognitive cybersecurity regarding …
attention and interest of practitioners and researchers in cognitive cybersecurity regarding …