Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Evaluation of information security awareness among Palestinian learners
This research aims to assess the level of Internet users’ security awareness among Palestinian learners. The study focuses on five fundamental security issues involving passwords, social media usage, email usage, security of mobile devices, and social engineering. A...
Humans in the loop: Cyber security aspects in the consumer IoT context
Currently, the consumer electronics (CE) community largely ignore the humans in the loop, while framing cyber security solutions in the IoT context. In this work, we stress on the need towards a human-centric approach to cyber security by shifting focus from "humans...
When it comes to addressing burnout, it needs to start from the top
Business Express
Augmented reality and the digital twin: State-of-the-art and perspectives for cyber security
The rapid advancements of technology related to the Internet of Things and Cyber-Physical Systems mark an ongoing industrial revolution. Digital Twins and Augmented Reality play a significant role in this technological advancement. They are highly complementary...
Remote working pre- and post-COVID-19: an analysis of new threats and risks to security and privacy
In this article, we critically analyse cyber security and privacy concerns arising due to remote working during the coronavirus pandemic. Through our work, we discover a series of security risks emerging because of the realities...
Influence of human factors on cyber security within healthcare organisations: A systematic review
Cybersecurity is increasingly becoming a prominent concern among healthcare providers in adopting digital technologies for improving the quality of care delivered to patients. The recent reports on cyber attacks, such as ransomware and WannaCry, have brought to life...
Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
This study reviewed number of factors such as the role of personal, social, socio-cognitive, environmental, & technological factors that may individually or collectively influence software engineers’ cyber hygiene behaviour. The positive and negative factors...
Why are healthcare organisations targets for cyber attacks?
Healthcare services are under pressure. The Covid-19 pandemic has stretched them to their limit. As if the strains of a pandemic weren’t enough, healthcare organisations have also been subject to cyber attacks. We’d like to think our healthcare services are immune to...
CyberCheck.me: A review of a small to medium enterprise cybersecurity awareness program
Small to Medium Enterprises (SMEs) constitute a significant portion of a country's business activity and make a substantial contribution to the national supply chain. Despite their importance, there is a notable lack of comprehensive studies and reports that assess...
Evaluation strategies for cyber security training methods: A literature review
Security and Awareness Training (SAT) has been available for several decades and is commonly given as a suggestion for improving the cyber security behavior of end-users. However, attackers continue to exploit the human factor suggesting that current SAT methods are...
Cyber security and digital exclusion of seniors: What do they fear?
Seniors represent a group that, compared to other groups, lives in a digital exclusion to an excessive extent, mainly due to the fact that they lack the necessary knowledge to use digital technology and digital services. Based on empirical data collected from seniors...
Is it possible to change the cyber security behaviours of employees? Barriers and promoters
The increase in cyber attacks cause individuals and businesses to face financial loss and reputation damage. Most cyber security studies ignore human factor and focus only on technological measures although the cyber security behaviors of employees are vital for the...
Introduction to the Special section on artificial intelligence security: Adversarial attack and defense
Artificial intelligence (AI) has been widely adopted in various applications such as face detection, speech recognition, machine learning, etc. Due to the lack of theoretical explanation, recent works show that AI is vulnerable to adversarial attacks, especially deep...
What parts of usable security are most important to users?
This paper builds on previous work and investigates what usability factors users prioritize and what demographic factors that affects the perception of usability factors. This is done through a survey answered by 1452 respondents from Sweden, Italy and UK. The results...
Cyber insurance report declares ransomware a ‘digital pandemic’
Silicon Republic
Cyber insurance costs up by a third
Computer Weekly
Beyond Murphy’s law: Applying wider human factors behavioural science approaches in cyber security resilience
Practitioners’ experience and use of different assessment methods and approaches to establish cyber-security vulnerabilities and risk are evaluated. Qualitative and quantitative methods and data are used for different stages of investigations in order to derive risk...
Social engineering attacks: Recent advances and challenges
The world’s technological landscape is continuously evolving with new possibilities, yet also evolving in parallel with the emergence of new threats. Social engineering is of predominant concern for industries, governments and institutions due to the exploitation of...
Human characteristics and genomic factors as behavioural aspects for cyber security
This work aims to hypothesise a possible holistic architecture for specific human behaviour factors involved in cyber security risks. A good cyber security habit could prevent incidents and protect against attacks. Habits are mostly initiated automatically. Therefore,...
Digital human in cyber security risk assessment
The work aims to build a formal ontology-based model for cyber security risk assessment that considers digital human characteristics. A multi-layered architecture solution was build as a proof of concept to maintain a set of artificial intelligence algorithms and...
Understanding the last line of defense: Human response to cyber security events
Cybersecurity is an escalating concern in today's technology-driven world, spanning consumer, corporate, and military domains. A literature review focused on human responses to cybersecurity incidents reveals a three-phase process in cybersecurity response: 1....