Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research
Purpose The impact of stress on personal and work-related outcomes has been studied in
the information systems (IS) literature across several professions. However, the …
the information systems (IS) literature across several professions. However, the …
Why security and privacy research lies at the centre of the information systems (IS) artefact: Proposing a bold research agenda
In this essay, we outline some important concerns in the hope of improving the effectiveness
of security and privacy research. We discuss the need to re-examine our understanding of …
of security and privacy research. We discuss the need to re-examine our understanding of …
Appealing to sense and sensibility: System 1 and system 2 interventions for fake news on social media
Disinformation on social media—commonly called “fake news”—has become a major
concern around the world, and many fact-checking initiatives have been launched to …
concern around the world, and many fact-checking initiatives have been launched to …
Questioning racial and gender bias in AI-based recommendations: Do espoused national cultural values matter?
One realm of AI, recommender systems have attracted significant research attention due to
concerns about its devastating effects to society's most vulnerable and marginalised …
concerns about its devastating effects to society's most vulnerable and marginalised …
Eyes wide open: The role of situational information security awareness for security‐related behaviour
L Jaeger, A Eckhardt - Information Systems Journal, 2021 - Wiley Online Library
Most contemporary studies on information security focus on largely static phenomena in
examining security‐related behaviours. We take a more dynamic, situational and …
examining security‐related behaviours. We take a more dynamic, situational and …
Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …
internal security threats and promote compliance with information security policies. Yet …
Tuning out security warnings
Research in the fields of information systems and human-computer interaction has shown
that habituation—decreased response to repeated stimulation—is a serious threat to the …
that habituation—decreased response to repeated stimulation—is a serious threat to the …
More harm than good? How messages that interrupt can make us vulnerable
System-generated alerts are ubiquitous in personal computing and, with the proliferation of
mobile devices, daily activity. While these interruptions provide timely information, research …
mobile devices, daily activity. While these interruptions provide timely information, research …
The phishing funnel model: a design artifact to predict user susceptibility to phishing websites
Phishing is a significant security concern for organizations, threatening employees and
members of the public. Phishing threats against employees can lead to severe security …
members of the public. Phishing threats against employees can lead to severe security …