Finding grace in responses to adverse cybersecurity incidents

M Dupuis, R Searle, KV Renaud - Journal of Intellectual Capital, 2024 - emerald.com
Purpose The purpose of this study was to investigate the role of grace in the aftermaths of
adverse cybersecurity incidents. Adverse incidents are an inescapable fact of life in …

How do you Feel about Cybersecurity?–A Literature Review on Emotions in Cybersecurity

A von Preuschen, V Zimmermann… - International …, 2023 - research-collection.ethz.ch
Despite the relevance of emotions in explaining human behavior, emotions have
traditionally been neglected in models explaining cybersecurity behavior. In recent years …

Hacker, Their Actions, and Fear Appeal: A First Look Through the Lens of Children

R Paudel, MN Al-Ameen - … Publication of the 2024 Conference on …, 2024 - dl.acm.org
With the increasing use of computers and smartphones by children, their online safety has
become a major concern due to the lack of security awareness. Prior studies pointed to …

[PDF][PDF] ChatIDS: Advancing Explainable Cybersecurity Using Generative AI

V Jüttner, M Grimmer, E Buchmann - International Journal On …, 2024 - personales.upv.es
An intrusion detection system (IDS) is a proven approach to securing networks. Network-
based IDS solutions are typically installed on routers or Internet gateways. They can inspect …

Cybersecurity hygiene: blending home and work computing

TW Morris, JD Still - New Perspectives in Behavioral …, 2023 - taylorfrancis.com
Cybersecurity hygiene is explored within the context of the growing hybrid home-work
computing environment. The concepts of cyber hygiene and the hybrid home-work …

How do non experts think about cyber attack consequences?

KS Jones, NR Lodinger, BP Widlus… - … & Computer Security, 2022 - emerald.com
Purpose Nonexperts do not always follow the advice in cybersecurity warning messages. To
increase compliance, it is recommended that warning messages use nontechnical …

The Effectiveness of Education and Fear Appeal to Prevent Spear Phishing Attacks

S Alsulami, M Dupuis - 2024 Cyber Awareness and Research …, 2024 - ieeexplore.ieee.org
Spear phishing is one of the most popular types of social engineering attacks. The attacker
designs it using the personal data acquired from various sources, such as their social media …

Cyber Victimization: Tools Used to Combat Cybercrime and Victim

M Dupuis, E Jones - … Technology: ICICT 2024, London, Volume 1, 2024 - books.google.com
Cyber victimization is explored through the lens of end users and the tools they use to
combat cybercrime. These tools are important in mitigating a variety of threats to the …

Password Usage Behavior of Online Users

S Jin, M Dupuis - 2024 Cyber Awareness and Research …, 2024 - ieeexplore.ieee.org
The motivations for why individuals use passwords in the manner they do is explored using
the lens of Protection Motivation Theory. We employ a large-scale survey to examine these …

[PDF][PDF] Cyber Victimization: Tools Used to Combat Cybercrime and Victim Characteristics

M Dupuis, E Jones - International Congress on Information and …, 2024 - library.oapen.org
Cyber victimization is explored through the lens of end users and the tools they use to
combat cybercrime. These tools are important in mitigating a variety of threats to the …