[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises

S Chaudhary, V Gkioulos, S Katsikas - Computer Science Review, 2023 - Elsevier
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …

The nudge puzzle: matching nudge interventions to cybersecurity decisions

V Zimmermann, K Renaud - ACM Transactions on Computer-Human …, 2021 - dl.acm.org
Nudging is a promising approach, in terms of influencing people to make advisable choices
in a range of domains, including cybersecurity. However, the processes underlying the …

Systematically understanding cybersecurity economics: A survey

M Kianpour, SJ Kowalski, H Øverby - Sustainability, 2021 - mdpi.com
Insights in the field of cybersecurity economics empower decision makers to make informed
decisions that improve their evaluation and management of situations that may lead to …

{SoK}: Still Plenty of Phish in the Sea—A Taxonomy of {User-Oriented} Phishing Interventions and Avenues for Future Research

A Franz, V Zimmermann, G Albrecht, K Hartwig… - … Symposium on Usable …, 2021 - usenix.org
Phishing is a prevalent cyber threat, targeting individuals and organizations alike. Previous
approaches on anti-phishing measures have started to recognize the role of the user, who …

Accessible and inclusive cyber security: a nuanced and complex challenge

K Renaud, L Coles-Kemp - SN Computer Science, 2022 - Springer
It has been argued that human-centred security design needs to accommodate the
considerations of three dimensions:(1) security,(2) usability and (3) accessibility. The latter …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs

K Renaud, J Ophoff - Organizational Cybersecurity Journal: Practice …, 2021 - emerald.com
Purpose There is widespread concern about the fact that small-and medium-sized
enterprises (SMEs) seem to be particularly vulnerable to cyberattacks. This is perhaps …

Farsight: Fostering Responsible AI Awareness During AI Application Prototyping

ZJ Wang, C Kulkarni, L Wilcox, M Terry… - Proceedings of the CHI …, 2024 - dl.acm.org
Prompt-based interfaces for Large Language Models (LLMs) have made prototyping and
building AI-powered applications easier than ever before. However, identifying potential …

Shame in cyber security: effective behavior modification tool or counterproductive foil?

K Renaud, R Searle, M Dupuis - Proceedings of the 2021 New Security …, 2021 - dl.acm.org
Organizations often respond to cyber security breaches by blaming and shaming the
employees who were involved. There is an intuitive natural justice to using such strategies in …

Can financial incentives help with the struggle for security policy compliance?

S Goel, KJ Williams, J Huang, M Warkentin - Information & management, 2021 - Elsevier
This study examined the effects of financial incentives on security policy compliance.
Participants were recruited for a computerized in-basket job simulation and randomly …