Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning
Introduction The dynamic and sophisticated nature of phishing attacks, coupled with the
relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …
relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …
The role of cyber security in advancing sustainable digitalization: Opportunities and challenges
SS Goswami, S Sarkar, KK Gupta… - Journal of Decision …, 2023 - jdaic-journal.org
Sustainable digitalization is a growing trend in which digital technology is used to promote
environmental, social, and economic sustainability. Cyber threats can undermine …
environmental, social, and economic sustainability. Cyber threats can undermine …
Evaluation of contextual and game-based training for phishing detection
J Kävrestad, A Hagberg, M Nohlberg, J Rambusch… - Future Internet, 2022 - mdpi.com
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on
the individual user. The individual user is expected to engage in secure behavior by …
the individual user. The individual user is expected to engage in secure behavior by …
When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?
O Michalec, S Milyaeva, A Rashid - Big Data & Society, 2022 - journals.sagepub.com
Big data technologies are entering the world of ageing computer systems running critical
infrastructures. These innovations promise to afford rapid Internet connectivity, remote …
infrastructures. These innovations promise to afford rapid Internet connectivity, remote …
Anticipatory governance in biobanking: security and risk management in digital health
D Rychnovská - Science and engineering ethics, 2021 - Springer
Although big-data research has met with multiple controversies in diverse fields, political
and security implications of big data in life sciences have received less attention. This paper …
and security implications of big data in life sciences have received less attention. This paper …
The fabrication of a necessary policy fiction: the interoperability 'solution'for biometric borders
P Trauttmansdorff - Critical Policy Studies, 2023 - Taylor & Francis
This article investigates the European Union's (EU) effort to establish an interoperable
biometric border regime. Drawing on interview material and ethnographic observation, I …
biometric border regime. Drawing on interview material and ethnographic observation, I …
Characterizing the evolution of psychological tactics and techniques exploited by malicious emails
T Longtchi, S Xu - arXiv preprint arXiv:2408.11586, 2024 - arxiv.org
The landscape of malicious emails and cyber social engineering attacks in general are
constantly evolving. In order to design effective defenses against these attacks, we must …
constantly evolving. In order to design effective defenses against these attacks, we must …
Why IT security needs therapy
U Menges, J Hielscher, A Buckmann, A Kluge… - … on Research in …, 2021 - Springer
Over the past decade, researchers investigating IT security from a socio-technical
perspective have identified the importance of trust and collaboration between different …
perspective have identified the importance of trust and collaboration between different …
Human-driven and human-centred cybersecurity: policy-making implications
Purpose The purpose of this paper is to challenge the prevailing, stereotypical approach of
the human aspect of cybersecurity, ie treating people as weakness or threat. Instead, several …
the human aspect of cybersecurity, ie treating people as weakness or threat. Instead, several …