Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?

Z Yan, T Robertson, R Yan, SY Park, S Bordoff… - Computers in Human …, 2018 - Elsevier
It has been widely recognized in the psychology of cybersecurity literature that ordinary
users rather than technology systems are the weakest link in cybersecurity. The present …

[图书][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …

Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity

K Sharma, X Zhan, FFH Nah, K Siau… - … : Practice, Process and …, 2021 - emerald.com
Purpose Phishing attacks are the most common cyber threats targeted at users. Digital
nudging in the form of framing and priming may reduce user susceptibility to phishing. This …

Passive-and not active-risk tendencies predict cyber security behavior

I Arend, A Shabtai, T Idan, R Keinan… - Computers & Security, 2020 - Elsevier
Vulnerabilities to online cyber-related crime are typically the result of poor decisions on the
part of users. To date, research on risk-taking behavior applied to cyber-security situations …

Cyber attacks, contributing factors, and tackling strategies: the current status of the science of cybersecurity

S Bordoff, Q Chen, Z Yan - Cyber Law, Privacy, and Security …, 2019 - igi-global.com
This article describes how as access to the Internet has increased, cybersecurity has
become important, with businesses and the government spending much time and resources …

Framing effects on online security behavior

N Rodríguez-Priego, R Van Bavel, J Vila… - Frontiers in …, 2020 - frontiersin.org
We conducted an incentivized lab experiment examining the effect of gain vs. loss-framed
warning messages on online security behavior. We measured the probability of suffering a …

Decision-Makers' understanding of cyber-security's systemic and dynamic complexity: insights from a board game for bank managers

S Zeijlemaker, EAJA Rouwette, G Cunico, S Armenia… - Systems, 2022 - mdpi.com
Cyber-security incidents show how difficult it is to make optimal strategic decisions in such a
complex environment. Given that it is hard for researchers to observe organisations' decision …

Dynamic capabilities in cybersecurity intelligence: A meta-synthesis to enhance protection against cyber threats

A Pigola, PR Da Costa - … of the Association for Information Systems, 2023 - aisel.aisnet.org
Advanced cybersecurity threats with automated capabilities are on the rise in industries such
as finance, healthcare, technology, retail, telecoms, and transportation, as well as …

Four domains of cybersecurity: a risk-based systems approach to cyber decisions

ZA Collier, I Linkov, JH Lambert - Environment Systems and Decisions, 2013 - Springer
With pervasive reliance on information technology, the robustness and security of these
systems are critical to diverse infrastructure systems and particularly to resilience of industry …

The influence of ethical principles and policy awareness priming on university students' judgements about ICT code of conduct compliance

D Richards, SB Nazeer Khan, P Formosa… - … : Practice, Process and …, 2022 - emerald.com
Purpose To protect information and communication technology (ICT) infrastructure and
resources against poor cyber hygiene behaviours, organisations commonly require internal …