The future cybersecurity workforce: Going beyond technical skills for successful cyber performance

J Dawson, R Thomson - Frontiers in psychology, 2018 - frontiersin.org
One of the challenges in writing an article reviewing the current state of cyber education and
workforce development is that there is a paucity of quantitative assessment regarding the …

Developing metrics to assess the effectiveness of cybersecurity awareness program

S Chaudhary, V Gkioulos, S Katsikas - Journal of Cybersecurity, 2022 - academic.oup.com
Cybersecurity awareness (CSA) is not just about knowing, but also transforming things
learned into practice. It is a continuous process that needs to be adjusted in subsequent …

The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian universities

FB Fatokun, S Hamid, A Norman… - Journal of Physics …, 2019 - iopscience.iop.org
A lot of cybersecurity breaches occur due to human errors. Tertiary institutions need to
enhance students' cybersecurity awareness and capabilities, hence promoting safe …

Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks

P Rajivan, C Gonzalez - Frontiers in psychology, 2018 - frontiersin.org
Success of phishing attacks depend on effective exploitation of human weaknesses. This
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …

GPkit: A human-centered approach to convex optimization in engineering design

E Burnell, NB Damen, W Hoburg - … of the 2020 chi conference on human …, 2020 - dl.acm.org
We present GPkit, a Python toolkit for Geometric and Signomial Programming that prioritizes
explainability and incremental complexity. GPkit was designed through an ethnographic …

Exploring potential gender differences in information security and privacy

T McGill, N Thompson - Information & Computer Security, 2021 - emerald.com
Purpose Information technology users often fail to adopt necessary security and privacy
measures, leading to increased risk of cybercrimes. There has been limited research on how …

Gender differences in information security perceptions and behaviour

T McGill, N Thompson - 29th Australasian Conference on …, 2018 - espace.curtin.edu.au
Information security is of universal concern to computer users from all walks of life. Though
gender differences in technology adoption are well researched, scant attention has been …

What mid-career professionals think, know, and feel about phishing: Opportunities for university it departments to better empower employees in their anti-phishing …

AC Tally, J Abbott, A Bochner, S Das… - Proceedings of the ACM …, 2023 - dl.acm.org
Phishing attacks, in which deceptive messages purporting to be from a legitimate contact are
used to trick recipients and acquire sensitive information for the purposes of committing …

Towards implementing inclusive authentication technologies for older adults

S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber - Who Are You, 2019 - papers.ssrn.com
Abstract Two-factor authentication (2FA) provides protection for on-line accounts through
efficient and highly robust access control. Adoption and usability, however, remain …

Non-inclusive online security: older adults' experience with two-factor authentication

S Das, A Kim, B Jelen, L Huber… - Proceedings of the 54th …, 2020 - papers.ssrn.com
Older adults access critical resources online, including bank, retirement, and health
insurance accounts. Thus, it is necessary to protect their accounts so they can confidently …