Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Influence of human factors on cyber security within healthcare organisations: A systematic review
Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life...
Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
This study reviewed number of factors such as the role of personal, social, socio-cognitive, environmental, & technological factors that may individually or collectively influence software engineers’ cyber hygiene behaviour. The positive and negative factors...
Why are healthcare organisations targets for cyber attacks?
Healthcare services are under pressure. The Covid-19 pandemic has stretched them to their limit. As if the strains of a pandemic weren’t enough, healthcare organisations have also been subject to cyber attacks. We’d like to think our healthcare services are immune to...
CyberCheck.me: A review of a small to medium enterprise cybersecurity awareness program
Small to Medium Enterprises (SMEs) constitute a significant portion of a country's business activity and make a substantial contribution to the national supply chain. Despite their importance, there is a notable lack of comprehensive studies and reports that assess...
Evaluation strategies for cyber security training methods: A literature review
Security and Awareness Training (SAT) has been available for several decades and is commonly given as a suggestion for improving the cyber security behavior of end-users. However, attackers continue to exploit the human factor suggesting that current SAT methods are...
Cyber security and digital exclusion of seniors: What do they fear?
Seniors represent a group that, compared to other groups, lives in a digital exclusion to an excessive extent, mainly due to the fact that they lack the necessary knowledge to use digital technology and digital services. Based on empirical data collected from seniors...
Is it possible to change the cyber security behaviours of employees? Barriers and promoters
The increase in cyber attacks cause individuals and businesses to face financial loss and reputation damage. Most cyber security studies ignore human factor and focus only on technological measures although the cyber security behaviors of employees are vital for the...
Introduction to the Special section on artificial intelligence security: Adversarial attack and defense
Artificial intelligence (AI) has been widely adopted in various applications such as face detection, speech recognition, machine learning, etc. Due to the lack of theoretical explanation, recent works show that AI is vulnerable to adversarial attacks, especially deep...
What parts of usable security are most important to users?
This paper builds on previous work and investigates what usability factors users prioritize and what demographic factors that affects the perception of usability factors. This is done through a survey answered by 1452 respondents from Sweden, Italy and UK. The results...
Cyber insurance report declares ransomware a ‘digital pandemic’
Silicon Republic
Cyber insurance costs up by a third
Computer Weekly
Beyond Murphy’s law: Applying wider human factors behavioural science approaches in cyber security resilience
Practitioners’ experience and use of different assessment methods and approaches to establish cyber-security vulnerabilities and risk are evaluated. Qualitative and quantitative methods and data are used for different stages of investigations in order to derive risk...
Social engineering attacks: Recent advances and challenges
The world’s technological landscape is continuously evolving with new possibilities, yet also evolving in parallel with the emergence of new threats. Social engineering is of predominant concern for industries, governments and institutions due to the exploitation of...
Human characteristics and genomic factors as behavioural aspects for cyber security
This work aims to hypothesise a possible holistic architecture for specific human behaviour factors involved in cyber security risks. A good cyber security habit could prevent incidents and protect against attacks. Habits are mostly initiated automatically. Therefore,...
Digital human in cyber security risk assessment
The work aims to build a formal ontology-based model for cyber security risk assessment that considers digital human characteristics. A multi-layered architecture solution was build as a proof of concept to maintain a set of artificial intelligence algorithms and...
Understanding the last line of defense: Human response to cyber security events
Cybersecurity is an escalating concern in today's technology-driven world, spanning consumer, corporate, and military domains. A literature review focused on human responses to cybersecurity incidents reveals a three-phase process in cybersecurity response: 1....
A mixed methods approach to understanding cyber-security vulnerability in the baby boomer population
The ongoing development and ubiquitous spread of technology has brought with it new threats and opportunities for online victimisation. Although human factors cyber-security research continues to try to mitigate these threats through the application of behavioural...
The current state of research on people, culture and cyber security
What is becoming apparent is that we need a better understanding of the human aspects of cyber security not only in terms of its impacts on organisations, communities and individuals but also in terms of how human behaviour itself contributes to cyber security-related...
Salvation Army Hit by Ransomware Attack
InfoSecurity Magazine
Human factors in cyber security: A scoping review
In this work we carry out a scoping review to investigate the take of the computer science community on the human-centric cyber security paradigm by considering the top conferences on network and computer security for the past six years. Results show that broadly two...
How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens
The Capability-Opportunity-Motivation-Behavior (COM-B) model posits that individuals' behavior can be understood by considering their capabilities, opportunities, motivation, and the interplay among these factors. This research aims to apply the COM-B model to analyze...