As internet technology and mobile applications increase in volume and complexity, malicious cyber-attacks are evolving, and as a result, society is facing greater security risks in cyberspace more than ever before. This study has extended the published literature on...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioral science as applied to cyber security awareness and online behavioral change.
Towards a method for examining the effects of cognitive load on the performance of cyber first responders
In this study we investigated the behaviour and physiological responding of trainee cyber security workers while undertaking a Capture-the-Flag (CTF) task. Participants were equipped with armbands that recorded two measures of cognitive load, including; heat flux and...
The awareness behaviour of students on cyber security awareness by using social media platforms: A case study at Central University of Technology
The unawareness of users about threats that can face them in cyberspace, can cause the successful execution of such threats. Users should establish a culture of awareness before entering the workforce. This study found that there is a lack among students to engage...
High-profile data breaches: Designing the right data protection architecture based on the law, ethics and trust
Although cyber attacks have tremendous financial and reputational ramifications for organisations, the number of high-profile data breaches continues to grow. Oftentimes, these data losses can be attributed to companies leaving themselves vulnerable through poor cyber...
Botching human factors in cyber security in business organizations
Human factors remained unexplored and underappreciated in information security. The mounting cyber-attacks, data breaches, and ransomware attacks are a result of human-enabled errors. Research indicates that existing information security plans do not account for human...
Instagram versus Snapchat: Self-expression and privacy concern on social media
With the increasing popularity of image-based social networking applications (apps), such as Snapchat and Instagram, social media users express multifaceted aspects of their self-concept online, while remaining concerned about privacy issues. This study investigates...
First steps toward measuring the readability of security advice
Security advice is one key way that consumers learn security behaviors. However, prior work has shown that this advice may not always be helpful and may be less accessible to those with lower internet skill or less education. As a first step toward improving the...
Internet users’ valuation of enhanced data protection on social media: Which aspects of privacy are worth the most?
As the development of the Internet and social media has led to pervasive data collection and usage practices, consumers’ privacy concerns have increasingly grown stronger. While previous research has investigated consumer valuation of personal data and privacy, only...
Know the game, not just the rules: The changing face of cyber security
This paper proposes 10 cyber security challenges that need to be addressed, in an attempt to spark discussion about the global approach to cyber security. Read full paper Authors: Richard Horne PwC
Building organizational risk culture in cyber security: The role of human factors
Experts stress the importance of human beings in cyber security prevention strategies, given that people are often considered the weakest link in the chain of security. In fact, international reports analyzing cyber-attacks confirm the main problem is represented by...