[PDF][PDF] The age of cyberpsychology: An overview

JR Ancis - 2020 - assets.pubpub.org
This article serves as an overview and introduction to the discipline of cyberpsychology.
Research and scholarship on the interaction of technology and human behavior through the …

Examining the efficacy of decoy-based and psychological cyber deception

KJ Ferguson-Walter, MM Major, CK Johnson… - 30th USENIX security …, 2021 - usenix.org
The threat of cyber attacks is a growing concern across the world, leading to an increasing
need for sophisticated cyber defense techniques. Attackers often rely on direct observation …

Measuring remote working skills: Scale development and validation study

S Benligiray, AY Güngör, İ Akbaş - Plos one, 2024 - journals.plos.org
Remote work, one of the most significant working arrangements of today, requires certain
employee skills. Although there are some hints, there is not much information in the literature …

[HTML][HTML] Reducing risk to security and privacy in the selection of trigger-action rules: Implicit vs. explicit priming for domestic smart devices

PL Morgan, EIM Collins, T Spiliotopoulos… - International Journal of …, 2022 - Elsevier
Smart home device usage is increasing, as is the diversity of users and range of devices.
Additionally, it is becoming increasingly common to interconnect devices (eg, via trigger …

Susceptibility and resilience to cyber threat: Findings from a scenario decision program to measure secure and insecure computing behavior

CF Weems, I Ahmed, GG Richard III, JD Russell… - PloS one, 2018 - journals.plos.org
Interest in the individual differences underlying end user computer security behavior has led
to the development of a multidisciplinary field of research known as behavioral information …

Game of Travesty: Decoy-based Psychological Cyber Deception for Proactive Human Agents

Y Hu, Q Zhu - arXiv preprint arXiv:2309.13403, 2023 - arxiv.org
The concept of cyber deception has been receiving emerging attention. The development of
cyber defensive deception techniques requires interdisciplinary work, among which …

Reconstructive psychological assessment (RPA) applied to the analysis of digital behavioral residues in forensic contexts

F Ceballos-Espinoza - Journal of Criminal Psychology, 2024 - emerald.com
Purpose This paper aims to explore advances in indirect personality assessment, with
emphasis on the psychology of digital behavior based on the analysis of new technological …

Understanding the relationship between cybercrime and human behavior through criminological theories and social networking sites

AM Mohammed, V Benson… - Encyclopedia of Criminal …, 2020 - igi-global.com
This article seeks to gain a better understanding of how to address some of the challenges
in the digital world. In order to do this, the authors presented some of the emerging issues in …

[PDF][PDF] Smartphones Hinder Prospective Memory in Users With High Levels of Smartphone Dependency

HE Phelps, C Jacova - 2023 - assets.pubpub.org
Prospective memory (PM) has rarely been investigated in the context of smartphones. We
embedded a PM task in an online, smartphone-based survey that participants were asked to …

Bridging the Gap: Case Studies for Forensic Cyberpsychology in Cyber Threat Analysis and Prediction

MS Rich - 2024 - search.proquest.com
This exegesis examines the integration between cyber behavioral sciences, digital
forensics, and cybersecurity, addressing a critical gap in existing cybersecurity strategies …