Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors
SM Kennison, E Chan-Tin - Frontiers in Psychology, 2020 - frontiersin.org
Individuals' use of insecure cybersecurity behaviors, including the use of weak passwords, is
a leading contributor to cybersecurity breaches. While training individuals on best practices …
a leading contributor to cybersecurity breaches. While training individuals on best practices …
Modern aspects of cyber-security training and continuous adaptation of programmes to trainees
Nowadays, more-and-more cyber-security training is emerging as an essential process for
the lifelong personnel education in organizations, especially for those which operate critical …
the lifelong personnel education in organizations, especially for those which operate critical …
Cyber-attack scoring model based on the offensive cybersecurity framework
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …
Cybersecurity Education within a Computing Science Program-A Literature Review
The importance of cybersecurity education within a computer science program is greater
than ever in today's rapidly advancing technological landscape. In order to protect sensitive …
than ever in today's rapidly advancing technological landscape. In order to protect sensitive …
An exploration of the awareness and attitudes of psychology students regarding their psychological literacy for working in the cybersecurity industry
We propose that psychology graduates are uniquely placed to work in the cybersecurity
industry due to their understanding of human behavior and the possession of skills needed …
industry due to their understanding of human behavior and the possession of skills needed …
Who creates strong passwords when nudging fails
SM Kennison, IT Jones, VH Spooner… - Computers in Human …, 2021 - Elsevier
The use of strong passwords is viewed as a recommended cybersecurity practice, as the
hacking of weak passwords led to major cybersecurity breaches. The present research …
hacking of weak passwords led to major cybersecurity breaches. The present research …
A personalized learning theory-based cyber-security training exercise
N Chowdhury, V Gkioulos - International Journal of Information Security, 2023 - Springer
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the
development of diverse CS training programs and offerings. It has been noted that even …
development of diverse CS training programs and offerings. It has been noted that even …
[PDF][PDF] Perception, Awareness and Attitude of female postgraduate students towards cyberethical behaviour in North-Central Nigeria universities
AO Dunmade - PhD diss., Adeleke University. https://www …, 2022 - researchgate.net
DEDICATION This work is dedicated to God Almighty for His guidance, love and care. I am
indebted to Jehovah, the Source and Giver of Life for granting the divine grace and …
indebted to Jehovah, the Source and Giver of Life for granting the divine grace and …
Multi-dimensional cybersecurity education design: A case study
R Pirta-Dreimane, A Brilingaitė… - 2022 IEEE Intl Conf …, 2022 - ieeexplore.ieee.org
Global economies depend on business continuity within the digital space, and cybersecurity
is becoming a strategic capability among nations and continents. Accordingly, the need for …
is becoming a strategic capability among nations and continents. Accordingly, the need for …
Practice-oriented smartphone security exercises for developing cybersecurity mindset in high school students
LM Podila, JP Bandreddi, JI Campos… - … , and Learning for …, 2020 - ieeexplore.ieee.org
Advancements in technology and the increase in Internet usage through mobile devices
have led to greater visibility of organizations and individuals to cybercrimes. Teenagers …
have led to greater visibility of organizations and individuals to cybercrimes. Teenagers …