Navigating cybersecurity training: A comprehensive review

SAD Qawasmeh, AAS AlQahtani, MK Khan - Computers and Electrical …, 2025 - Elsevier
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening
defenses against cyber threats. This survey examines a spectrum of cybersecurity …

State-of-the-art review on current approaches to female inclusiveness in software engineering and computer science in higher education

Y Kovaleva, J Kasurinen, E Kindsiko… - IEEE Access, 2023 - ieeexplore.ieee.org
Software engineering (SE) and computer science (CS) programs in universities worldwide
are marked by a gender gap, which subsequently translates into a gender gap at the …

Privacy champions in software teams: Understanding their motivations, strategies, and challenges

M Tahaei, A Frik, K Vaniea - Proceedings of the 2021 CHI Conference …, 2021 - dl.acm.org
Software development teams are responsible for making and implementing software design
decisions that directly impact end-user privacy, a challenging task to do well. Privacy …

Exploring gender dynamics in cybersecurity education: a self-determination theory and social cognitive theory perspective

SP Francis, VK Kolil, V Pavithran, I Ray… - Computers & Security, 2024 - Elsevier
The cybersecurity industry is facing two major challenges as cyber threats get more serious:
a shortage of skilled workers to defend against these attacks and a noticeable …

Security notifications in static analysis tools: Developers' attitudes, comprehension, and ability to act on them

M Tahaei, K Vaniea, K Beznosov… - Proceedings of the 2021 …, 2021 - dl.acm.org
Static analysis tools (SATs) have the potential to assist developers in finding and fixing
vulnerabilities in the early stages of software development, requiring them to be able to …

Addressing cybersecurity challenges in education

WJ Triplett - International Journal of STEM Education for …, 2023 - journal.gmpionline.com
This study aimed to address the challenges of cybersecurity in education. As kindergarten
through twelfth-grade education shifts to online and remote learning, educators and …

Users' adoption of national digital identity systems: Human-centric cybersecurity review

M Hilowle, W Yeoh, M Grobler, G Pye… - Journal of Computer …, 2023 - Taylor & Francis
This paper establishes the current state of human-centric cybersecurity factors that influence
users' adoption of national digital identity systems (NDIDs). NDIDs are national-level security …

Until you have something to lose! Loss aversion and two-factor authentication adoption

AR Pratama, FM Firmansyah - Applied Computing and Informatics, 2021 - emerald.com
Purpose In this study, the authors seek to understand factors that naturally influence users to
adopt two-factor authentication (2FA) without even trying to intervene by investigating factors …

Fostering cybersecurity awareness and skills development through digital game-based learning

A Piki, E Stavrou, A Procopiou… - … on Behavioural and …, 2023 - ieeexplore.ieee.org
Technological innovations pose several security, safety, and privacy threats. An array of
educational games has been developed to raise cybersecurity awareness and promote …

Understanding how to diversify the cybersecurity workforce: A qualitative analysis

M Namukasa, C Ficke… - Journal of …, 2023 - digitalcommons.kennesaw.edu
A robust cybersecurity workforce is critical for protection against a range of malicious attacks.
However, it has been noted that there are many vacancies and a shortage of individuals …