Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?

Z Yan, T Robertson, R Yan, SY Park, S Bordoff… - Computers in Human …, 2018 - Elsevier
It has been widely recognized in the psychology of cybersecurity literature that ordinary
users rather than technology systems are the weakest link in cybersecurity. The present …

Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers

Z Yan, Y Xue, Y Lou - Computers in Human Behavior, 2021 - Elsevier
K-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying
both risk factors and protective factors associated with intuitive and rational judgment of …

The weakest prespecification

CAR Hoare, J He - Information Processing Letters, 1987 - dl.acm.org
The weakest prespecification | Information Processing Letters skip to main content ACM Digital
Library home ACM home Google, Inc. (search) Advanced Search Browse About Sign in …

[引用][C] What the public knows about cybersecurity

A Smith - 2017 - policycommons.net
A majority of internet users can answer fewer than half the questions correctly on a difficult
knowledge quiz about cybersecurity issues and concepts.

Development of the cybersecurity scale (CS-S): Evidence of validity and reliability

I Arpaci, K Sevinc - Information Development, 2022 - journals.sagepub.com
This study aimed to develop a cybersecurity scale to measure individuals' practices and
perceptions regarding cybersecurity. The study tested psychometric properties of the …

Influencing mental models of security: a research agenda

R Wash, E Rader - Proceedings of the 2011 New Security Paradigms …, 2011 - dl.acm.org
Over 80 million households in the United States have a home computer and an Internet
connection. The vast majority of these are administered by people who have little computer …

Personality as a predictor of cybersecurity behavior.

AT Shappie, CA Dawson, SM Debb - Psychology of Popular Media, 2020 - psycnet.apa.org
Personality may better predict cybersecurity behavior relative to an individual's stated
intentions; however, people often behave in ways that are discordant with what they intend …

An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices

M Dodel, G Mesch - Computers & Security, 2019 - Elsevier
As Internet access and use have become ubiquitous, cyber-safety behaviors are a major
aspect of individuals' well-being and a matter of concern for national cyber-security officials …

Identifying core concepts of cybersecurity: Results of two Delphi processes

G Parekh, D DeLatte, GL Herman… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper presents and analyzes results of two Delphi processes that polled cybersecurity
experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These …

[HTML][HTML] Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment

MS Jalali, M Siegel, S Madnick - The Journal of Strategic Information …, 2019 - Elsevier
We developed a simulation game to study the effectiveness of decision-makers in
overcoming two complexities in building cybersecurity capabilities: potential delays in …