Stress, burnout, and security fatigue in cybersecurity: A human factors problem

C Nobles - HOLISTICA–Journal of Business and Public …, 2022 - sciendo.com
Stress, burnout, and security fatigue continue as slight destroyers of strong cybersecurity
and significant human factors concerns. The persistence of these human performance …

[PDF][PDF] Botching human factors in cybersecurity in business organizations

C Nobles - HOLISTICA–Journal of Business and Public …, 2018 - sciendo.com
Human factors remained unexplored and underappreciated in information security. The
mounting cyber-attacks, data breaches, and ransomware attacks are a result of human …

The human factors of cyber network defense

RS Gutzwiller, S Fugate, BD Sawyer… - Proceedings of the …, 2015 - journals.sagepub.com
Technology's role in the fight against malicious cyber-attacks is critical to the increasingly
networked world of today. Yet, technology does not exist in isolation: the human factor is an …

What Influences People's Adoption of Cognitive Cybersecurity?

C Tam, M Balau, T Oliveira - International Journal of Human …, 2023 - Taylor & Francis
Artificial intelligence (AI) and big data, among other new technologies, have attracted the
attention and interest of practitioners and researchers in cognitive cybersecurity regarding …

[PDF][PDF] A taxonomy for social engineering attacks via personal devices

H Aldawood, G Skinner - International Journal of Computer …, 2019 - researchgate.net
Social engineering attacks are a major threat to organizations and individuals as digitization
and connectivity through the internet increase. This study aims to review scholarly research …

[PDF][PDF] Establishing human factors programs to mitigate blind spots in cybersecurity

C Nobles - MWAIS 2019 Proceedings, 2019 - academia.edu
Most business organizations lack a human factors program and remain inattentive to human-
centric issues and human-related problems that are leading to cybersecurity incidents …

Exploring the hybrid space: Theoretical framework applying cognitive science in military cyberspace operations

Ø Jøsok, BJ Knox, K Helkala, RG Lugo… - … AC 2016, Held as Part of …, 2016 - Springer
Operations in cyberspace are enabled by a digitized battlefield. The ability to control
operations in cyberspace has become a central goal for defence forces. As a result, terms …

A human factor approach to threat modeling

LS Ferro, A Marrella, T Catarci - International Conference on Human …, 2021 - Springer
Cybersecurity has many challenges to address to ensure the protection of a system from an
attacker. Consequently, strategies have been developed to address a system's weakness …

Development and validation of technique to measure cyber situation awareness

P Lif, M Granåsen, T Sommestad - … International Conference On …, 2017 - ieeexplore.ieee.org
Within the cyber security domain, specifically within the field of computer network defence,
professional log analysts are employed to monitor organizations' networks in order to detect …

Expert-interviews led analysis of EEVi—A model for effective visualization in cyber-security

A Sethi, G Wills - 2017 IEEE Symposium on Visualization for …, 2017 - ieeexplore.ieee.org
The area of visualization in cyber-security is advancing at a fast pace. However, there is a
lack of standardized guidelines for designing and evaluating the resulting visualizations …