Humans and automation: Augmenting security operation centers

J Tilbury, S Flowerday - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
The continuous integration of automated tools into security operation centers (SOCs)
increases the volume of alerts for security analysts. This amplifies the risk of automation bias …

Exploring the factors that influence the cybersecurity behaviors of young adults

M Alanazi, M Freeman, H Tootell - Computers in Human Behavior, 2022 - Elsevier
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats.
Understanding the cybersecurity behaviors of young adults, and identifying the measures …

[HTML][HTML] A typology of cybersecurity behavior among knowledge workers

D Baltuttis, T Teubner, MTP Adam - Computers & Security, 2024 - Elsevier
While the cybersecurity literature on behavioral factors has expanded, current
countermeasures often overlook employee-specific behavioral differences, leading to …

Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails

M Butavicius, R Taib, SJ Han - Computers & Security, 2022 - Elsevier
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are
commonly cited as cues of deception that people can use to identify phishing emails …

[HTML][HTML] Automation Bias and Complacency in Security Operation Centers

J Tilbury, S Flowerday - Computers, 2024 - mdpi.com
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …

Empowering Students for Cybersecurity Awareness Management in the Emerging Digital Era: The Role of Cybersecurity Attitude in the 4.0 Industrial Revolution Era

B Ahamed, MRH Polas, AI Kabir… - SAGE …, 2024 - journals.sagepub.com
The purpose of the study is to examine how cybersecurity knowledge, password security,
and self-perception of skill affect cybersecurity awareness issues via the mediating lens of …

Assessing information security behaviour: A self-determination theory perspective

Y Gangire, A Da Veiga, M Herselman - Information & Computer …, 2021 - emerald.com
Purpose This paper outlines the development of a validated questionnaire for assessing
information security behaviour. The purpose of this paper is to present data from the …

Effectiveness of the Use of Mail Application Information Systems at the Center for Security and Enforcement of Environmental and Forestry Law in Sulawesi Region

N Rahman, AY Hasda… - … of Administration and …, 2024 - journal.ashapublishing.co.id
Effectiveness of the Use of Mail Application Information Systems at the Sulawesi Region
Environmental and Forestry Law Security and Enforcement Center (SIAP GAKKUM). The …

Optimism bias in susceptibility to phishing attacks: an empirical study

M Owen, SV Flowerday… - Information & Computer …, 2024 - emerald.com
Purpose Researchers looking for ways to change the insecure behaviour that results in
phishing have considered multiple possible reasons for such behaviour. Therefore, the …

The relationship between eWoM, security, quality of information and purchase behaviour at B2C e-commerce website: the moderating role of E-trustmarks

PT Ha, VT Tuan, NH Nam, NT Mai - Journal of Advances in …, 2024 - emerald.com
Purpose This study aims to investigate the moderating role of e-trustmarks in the relationship
between electronic word of mouth (eWoM), security, quality of information, and purchase …