Phishing is an identity theft evasion strategy used in which consumers accept bogus emails from fraudulent accounts that claim to belong to a legal and real company in the effort to steal sensitive information of the client. This act places many users’ privacy at...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
Does psychological distance and religiosity influence fraudulent customer behaviour?
Online businesses incur significant losses because of fraudulent customer behaviour. This study investigates the factors motivating fraudulent customer intention on eBay. A conceptual framework is developed that extends the theory of planned behaviour with religiosity...
Phishing in organizations: findings from a large-scale and long-term study
In this paper, we present findings from a large-scale and long-term phishing experiment that we conducted in collaboration with a partner company. Our experiment ran for 15 months during which time more than 14,000 study participants (employees of the company)...
Developing a framework to measure cyber resilience behaviour of indian bank employees
Cyber resiliency of an organization depends on the IT infrastructure and cyber security measures undertaken; however, a prominent factor to achieve resilience depends on the employees. Confronted with this bleak realization, it is only recently that the need for cyber...
Gamification of cyber security awareness – A systematic review of games
This thesis presents the state of the art of games used in cyber security awareness. In this regard, a systematic review of games following PRISMA guidelines was conducted on the relevant papers published between 2010 to 2021. The games were analyzed based on their...
The future human and behavioural challenges of cybersecurity
This chapter explores the future human and behavioural challenges that are likely to have an impact on cybersecurity. It identifies some general challenges that will need to be overcome. The first challenge will be to accept that cybersecurity practitioners are not...
What influences employees to follow security policies?
By combining the value of congruence model (VC), the theory of planned behaviour model (TPB), and security conscious care behaviour we show that security behaviour can be influenced through effortless and low-cost measures that are a very advantageous solution for...
Human-centric cyber security research: From trapping the bad guys to helping the good ones
The issue of cybersecurity has become much more prevalent over the last few years, with a number of widely publicised incidents, hacking attempts and data breaches reaching the news. There is no sign of an abatement in the number of cyber incidents, and it would be...
Avoid being a victim of social engineering attack during the COVID-19 pandemic
This article addresses how the COVID-19 disease outbreak has laid the groundwork for an increased social technology assault, the implications of these threats as well as some strategies for countering these challenges. This report would assist entities and enterprises...
Understanding factors that influence Unintentional Insider Threat: A framework to counteract unintentional risks
The exploitation of so-called insiders is increasingly recognised as a common vector for cyberattacks. Emerging work in this area has considered the phenomenon from various perspectives including the technological, the psychological and the sociotechnical. We extend...