The future cybersecurity workforce: Going beyond technical skills for successful cyber performance
One of the challenges in writing an article reviewing the current state of cyber education and
workforce development is that there is a paucity of quantitative assessment regarding the …
workforce development is that there is a paucity of quantitative assessment regarding the …
Developing metrics to assess the effectiveness of cybersecurity awareness program
S Chaudhary, V Gkioulos, S Katsikas - Journal of Cybersecurity, 2022 - academic.oup.com
Cybersecurity awareness (CSA) is not just about knowing, but also transforming things
learned into practice. It is a continuous process that needs to be adjusted in subsequent …
learned into practice. It is a continuous process that needs to be adjusted in subsequent …
The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian universities
A lot of cybersecurity breaches occur due to human errors. Tertiary institutions need to
enhance students' cybersecurity awareness and capabilities, hence promoting safe …
enhance students' cybersecurity awareness and capabilities, hence promoting safe …
Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks
P Rajivan, C Gonzalez - Frontiers in psychology, 2018 - frontiersin.org
Success of phishing attacks depend on effective exploitation of human weaknesses. This
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …
GPkit: A human-centered approach to convex optimization in engineering design
We present GPkit, a Python toolkit for Geometric and Signomial Programming that prioritizes
explainability and incremental complexity. GPkit was designed through an ethnographic …
explainability and incremental complexity. GPkit was designed through an ethnographic …
Exploring potential gender differences in information security and privacy
T McGill, N Thompson - Information & Computer Security, 2021 - emerald.com
Purpose Information technology users often fail to adopt necessary security and privacy
measures, leading to increased risk of cybercrimes. There has been limited research on how …
measures, leading to increased risk of cybercrimes. There has been limited research on how …
Gender differences in information security perceptions and behaviour
T McGill, N Thompson - 29th Australasian Conference on …, 2018 - espace.curtin.edu.au
Information security is of universal concern to computer users from all walks of life. Though
gender differences in technology adoption are well researched, scant attention has been …
gender differences in technology adoption are well researched, scant attention has been …
What mid-career professionals think, know, and feel about phishing: Opportunities for university it departments to better empower employees in their anti-phishing …
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are
used to trick recipients and acquire sensitive information for the purposes of committing …
used to trick recipients and acquire sensitive information for the purposes of committing …
Towards implementing inclusive authentication technologies for older adults
Abstract Two-factor authentication (2FA) provides protection for on-line accounts through
efficient and highly robust access control. Adoption and usability, however, remain …
efficient and highly robust access control. Adoption and usability, however, remain …
Non-inclusive online security: older adults' experience with two-factor authentication
Older adults access critical resources online, including bank, retirement, and health
insurance accounts. Thus, it is necessary to protect their accounts so they can confidently …
insurance accounts. Thus, it is necessary to protect their accounts so they can confidently …