Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors

SM Kennison, E Chan-Tin - Frontiers in Psychology, 2020 - frontiersin.org
Individuals' use of insecure cybersecurity behaviors, including the use of weak passwords, is
a leading contributor to cybersecurity breaches. While training individuals on best practices …

Modern aspects of cyber-security training and continuous adaptation of programmes to trainees

G Hatzivasilis, S Ioannidis, M Smyrlis, G Spanoudakis… - Applied Sciences, 2020 - mdpi.com
Nowadays, more-and-more cyber-security training is emerging as an essential process for
the lifelong personnel education in organizations, especially for those which operate critical …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

Cybersecurity Education within a Computing Science Program-A Literature Review

EP Ferrari, A Wong, Y Khmelevsky - Proceedings of the 26th Western …, 2024 - dl.acm.org
The importance of cybersecurity education within a computer science program is greater
than ever in today's rapidly advancing technological landscape. In order to protect sensitive …

An exploration of the awareness and attitudes of psychology students regarding their psychological literacy for working in the cybersecurity industry

J Taylor, M Whitty - Psychology Learning & Teaching, 2024 - journals.sagepub.com
We propose that psychology graduates are uniquely placed to work in the cybersecurity
industry due to their understanding of human behavior and the possession of skills needed …

Who creates strong passwords when nudging fails

SM Kennison, IT Jones, VH Spooner… - Computers in Human …, 2021 - Elsevier
The use of strong passwords is viewed as a recommended cybersecurity practice, as the
hacking of weak passwords led to major cybersecurity breaches. The present research …

A personalized learning theory-based cyber-security training exercise

N Chowdhury, V Gkioulos - International Journal of Information Security, 2023 - Springer
Current enterprises' needs for skilled cyber-security (CS) professionals have prompted the
development of diverse CS training programs and offerings. It has been noted that even …

[PDF][PDF] Perception, Awareness and Attitude of female postgraduate students towards cyberethical behaviour in North-Central Nigeria universities

AO Dunmade - PhD diss., Adeleke University. https://www …, 2022 - researchgate.net
DEDICATION This work is dedicated to God Almighty for His guidance, love and care. I am
indebted to Jehovah, the Source and Giver of Life for granting the divine grace and …

Multi-dimensional cybersecurity education design: A case study

R Pirta-Dreimane, A Brilingaitė… - 2022 IEEE Intl Conf …, 2022 - ieeexplore.ieee.org
Global economies depend on business continuity within the digital space, and cybersecurity
is becoming a strategic capability among nations and continents. Accordingly, the need for …

Practice-oriented smartphone security exercises for developing cybersecurity mindset in high school students

LM Podila, JP Bandreddi, JI Campos… - … , and Learning for …, 2020 - ieeexplore.ieee.org
Advancements in technology and the increase in Internet usage through mobile devices
have led to greater visibility of organizations and individuals to cybercrimes. Teenagers …