Integration of EEG and eye tracking technology: a systematic review
Electroencephalography, or EEG, measures brain signals and activities using small
electrodes which read electrical activity in the brain. For understanding cognitive patterns …
electrodes which read electrical activity in the brain. For understanding cognitive patterns …
Cybersecurity Serious Games Development: A Systematic Review
NC Yeong, MKB Hasan - Computers & Security, 2024 - Elsevier
Cybercrime tactics evolve alongside technology, prompting researchers to enhance
cybersecurity training for diverse internet users. Serious games have been developed as …
cybersecurity training for diverse internet users. Serious games have been developed as …
So many phish, so little time: Exploring email task factors and phishing susceptibility
Objective The present studies examine how task factors (eg, email load, phishing
prevalence) influence email performance. Background Phishing emails are a paramount …
prevalence) influence email performance. Background Phishing emails are a paramount …
[HTML][HTML] Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role …
A critical component to any modern cybersecurity endeavor is effective use of its human
resources to secure networks, maintain services and mitigate adversarial events. Despite …
resources to secure networks, maintain services and mitigate adversarial events. Despite …
Who are phishers luring?: A demographic analysis of those susceptible to fake emails
Previous research has identified several populations that are susceptible to inauthentic
emails (eg, spam). However, these studies utilize retrospective, self-report measures to …
emails (eg, spam). However, these studies utilize retrospective, self-report measures to …
Human performance factors in cyber security forensic analysis
J McClain, A Silva, G Emmanuel, B Anderson… - Procedia …, 2015 - Elsevier
Human performance has become a pertinent issue within cyber security. However, this
research has been stymied by the limited availability of expert cyber security professionals …
research has been stymied by the limited availability of expert cyber security professionals …
Exploring antecedents of professional skepticism on accounting students' performance in cybersecurity
Professional skepticism is a fundamental and critical construct for audit professionals.
Although accounting regulators, practitioners, and CPA examinations call for explicit …
Although accounting regulators, practitioners, and CPA examinations call for explicit …
Determining system requirements for human-machine integration in cyber security incident response
MM Nyre-Yu - 2019 - search.proquest.com
In 2019, cyber security is considered one of the most significant threats to the global
economy and national security. Top US agencies have acknowledged this fact, and …
economy and national security. Top US agencies have acknowledged this fact, and …
Identifying expertise gaps in cyber incident response: Cyber defender needs vs. Technological Development
M Nyre-Yu - 2021 - scholarspace.manoa.hawaii.edu
Incident response is an area within cyber defense that is responsible for detecting,
mitigating, and preventing threats within a given network. Like other areas of cyber security …
mitigating, and preventing threats within a given network. Like other areas of cyber security …
Experimental wargaming with SIGNAL
J Letchford, L Epifanovskaya, K Lakkaraju… - Military Operations …, 2022 - JSTOR
Wargames are a common tool for investigating complex conflict scenarios and have a long
history of informing military and strategic study. Historically, these games have often been …
history of informing military and strategic study. Historically, these games have often been …