" Why would money protect me from cyber bullying?": A Mixed-Methods Study of Personal Cyber Insurance

R Jain, T Hrle, M Marinetti, A Jenkins… - 2025 IEEE Symposium …, 2024 - computer.org
Individuals can become victims of security incidents, privacy violations, online scams, and
social media abuse. In addition to prevention, users should create response strategies in …

Fortifying the Human Firewall: Designing a Virtual Reality-Based Test to Measure Individuals' Cyber Security Competencies

F Schütz, L Steenken, JHD Menck, S Hugenberg… - 2024 - aisel.aisnet.org
Individuals are often considered the weakest link in the cyber security chain, making their
cyber security competencies (CSC) crucial as a" human firewall" against cyber-attacks …

The Lower the Risk, the Lower the Premium? Conceptualizing an Artifact for Usage-Based Pricing of Personal Cyber Insurance Policies

F Schütz, A Lukowitsch, GG Hoevel, S Trang - 2024 - aisel.aisnet.org
Cyber security attacks are on the rise not only on companies but also on private individuals.
Although the underlying cyber risks can be addressed by technical cyber security measures …

Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review

L Pfannenberg, F Schütz, S Gronemann… - Workshop on e …, 2022 - Springer
Abstract The Internet of Things (IoT) has become part of everyday life and recorded an
increasing number of users. However, security concerns have been raised regardless of the …

[PDF][PDF] Mitigating Cyber Risk in Personal Finance of the Elderly. Insights into Vulnerabilities, Cyber Hygiene and the Role of Personal Cyber Insurance

G Strupczewski - Cybersecurity and Law, 2024 - bibliotekanauki.pl
The paper investigates the growing cyber threats to personal finance, faced by the elderly in
the digital age. It begins by acknowledging the surge in cyber incidents, particularly …

Risk Assessment of Security Assets for Networked Swarm Systems Based on Time Series Decomposition of Temporal Knowledge Graph

Y Cui, Y Liu, Y Li, Z Huang - Chinese Conference on Swarm Intelligence …, 2023 - Springer
Assessing the risk of security assets presents a formidable challenge within the realm of
cybersecurity. The time series decomposition risk assessment (TSRA), which is a model …

[PDF][PDF] Decision-Making under Constraints: A Behavioral Economics Perspective on Cyber-Related Heuristics and Biases

M Wilczek - 2024 - bip.ug.edu.pl
UNIVERSITY OF GDAŃSK - FACULTY OF ECONOMICS Decision-Making under
Constraints: A Behavioral Economics Perspective on Cyber-Rel Page 1 UNIVERSITY OF …

Cyber Insurance Need of the Hour: To Combat Growing Cyber-Attacks within Cyber Space

S Routaray, M Arya, R Agnihotri - Library Progress International, 2024 - bpasjournals.com
There are still alarming gaps among organisations and individuals regarding'cyber-attacks
in cyber space and measures to create awareness about cyber insurance. In the realm of …

Threats from the Web and Cybersecurity Issues from the Perspective of Public Relations Professionals

D Tworzydło, N Życzyński, C Olexová… - Humanities and Social …, 2023 - journals.prz.edu.pl
This article aims to evaluate the approach of the public relations (PR) industry to
cybersecurity-related topics. The article is based on research results conducted by a team …

Check for updates Understanding the Corporate Use of IT Security Labels for IoT Products and Services: A Literature Review

L Pfannenberg, F Schütz, S Gronemann… - … Transformation in the … - books.google.com
The Internet of Things (IoT) has become part of everyday life and recorded an increasing
number of users. However, security concerns have been raised regardless of the many …