[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises

S Chaudhary, V Gkioulos, S Katsikas - Computer Science Review, 2023 - Elsevier
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …

[HTML][HTML] Driving behaviour change with cybersecurity awareness

S Chaudhary - Computers & Security, 2024 - Elsevier
Organisations implementing cybersecurity awareness (CSA) should strive to positively
change employees' attitudes and behaviours. In practice, though, most of such initiatives …

Hackers vs. testers: A comparison of software vulnerability discovery processes

D Votipka, R Stevens, E Redmiles, J Hu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …

Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

" Like Lesbians Walking the Perimeter": Experiences of {US}.{LGBTQ+} Folks With Online Security, Safety, and Privacy Advice

C Geeng, M Harris, E Redmiles… - 31st USENIX Security …, 2022 - usenix.org
Given stigma and threats surrounding being gay or transgender, LGBTQ+ folks often seek
support and information on navigating identity and personal (digital and physical) safety …

The case for adaptive security interventions

I Rauf, M Petre, T Tun, T Lopez, P Lunn… - ACM Transactions on …, 2021 - dl.acm.org
Despite the availability of various methods and tools to facilitate secure coding, developers
continue to write code that contains common vulnerabilities. It is important to understand …

Game‐based learning: A review of tabletop exercises for cybersecurity incident response training

GN Angafor, I Yevseyeva, Y He - Security and privacy, 2020 - Wiley Online Library
The surge in cyber security breaches including the shortage of skilled cyber incident
response (CSIR) professionals and the ever‐changing cyber threat landscape is a big …

Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach

AW Khan, S Zaib, F Khan, I Tarimer, JT Seo… - IEEE access, 2022 - ieeexplore.ieee.org
Security is the protection from various kinds of threats and most organizations engage in the
challenge of security especially cyber-attacks. The attacks are increasing rapidly, due to …

Adapting CTF challenges into virtual cybersecurity learning environments

S Karagiannis, E Magkos - Information & Computer Security, 2020 - emerald.com
Adapting CTF challenges into virtual cybersecurity learning environments | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …

Security managers are not the enemy either

L Reinfelder, R Landwirth, Z Benenson - … of the 2019 CHI Conference on …, 2019 - dl.acm.org
Security managers are leading employees whose decisions shape security measures and
thus influence the everyday work of all users in their organizations. To understand how …