Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning

MA Tamal, MK Islam, T Bhuiyan, A Sattar… - Frontiers in Computer …, 2024 - frontiersin.org
Introduction The dynamic and sophisticated nature of phishing attacks, coupled with the
relatively weak anti-phishing tools, has made phishing detection a pressing challenge. In …

The role of cyber security in advancing sustainable digitalization: Opportunities and challenges

SS Goswami, S Sarkar, KK Gupta… - Journal of Decision …, 2023 - jdaic-journal.org
Sustainable digitalization is a growing trend in which digital technology is used to promote
environmental, social, and economic sustainability. Cyber threats can undermine …

Evaluation of contextual and game-based training for phishing detection

J Kävrestad, A Hagberg, M Nohlberg, J Rambusch… - Future Internet, 2022 - mdpi.com
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on
the individual user. The individual user is expected to engage in secure behavior by …

When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?

O Michalec, S Milyaeva, A Rashid - Big Data & Society, 2022 - journals.sagepub.com
Big data technologies are entering the world of ageing computer systems running critical
infrastructures. These innovations promise to afford rapid Internet connectivity, remote …

Anticipatory governance in biobanking: security and risk management in digital health

D Rychnovská - Science and engineering ethics, 2021 - Springer
Although big-data research has met with multiple controversies in diverse fields, political
and security implications of big data in life sciences have received less attention. This paper …

The fabrication of a necessary policy fiction: the interoperability 'solution'for biometric borders

P Trauttmansdorff - Critical Policy Studies, 2023 - Taylor & Francis
This article investigates the European Union's (EU) effort to establish an interoperable
biometric border regime. Drawing on interview material and ethnographic observation, I …

Characterizing the evolution of psychological tactics and techniques exploited by malicious emails

T Longtchi, S Xu - arXiv preprint arXiv:2408.11586, 2024 - arxiv.org
The landscape of malicious emails and cyber social engineering attacks in general are
constantly evolving. In order to design effective defenses against these attacks, we must …

Why IT security needs therapy

U Menges, J Hielscher, A Buckmann, A Kluge… - … on Research in …, 2021 - Springer
Over the past decade, researchers investigating IT security from a socio-technical
perspective have identified the importance of trust and collaboration between different …

Human-driven and human-centred cybersecurity: policy-making implications

A Pawlicka, M Pawlicki, R Kozik… - … : People, Process and …, 2022 - emerald.com
Purpose The purpose of this paper is to challenge the prevailing, stereotypical approach of
the human aspect of cybersecurity, ie treating people as weakness or threat. Instead, several …