Understanding the Last Line of Defense: Human Response to Cybersecurity Events
暂无分享,去创建一个
[1] Shari Lawrence Pfleeger,et al. Leveraging behavioral science to mitigate cyber security risk , 2012, Comput. Secur..
[2] Jonghwa Park,et al. The role of privacy fatigue in online privacy behavior , 2018, Comput. Hum. Behav..
[3] Cleotilde Gonzalez,et al. Effects of cyber security knowledge on attack detection , 2015, Comput. Hum. Behav..
[4] Young U. Ryu,et al. Unrealistic optimism on information security management , 2012, Comput. Secur..
[5] Jing Chen,et al. The Role of Human Factors/Ergonomics in the Science of Security , 2015, Hum. Factors.
[6] Jeffrey M. Bradshaw,et al. The Dynamics of Trust in Cyberdomains , 2009, IEEE Intelligent Systems.
[7] Yee-Yin Choong,et al. Basing Cybersecurity Training on User Perceptions , 2012, IEEE Security & Privacy.
[8] Brenda K. Wiederhold,et al. The Role of Psychology in Enhancing Cybersecurity , 2014, Cyberpsychology Behav. Soc. Netw..
[9] Shuchih Ernest Chang,et al. Smartphone security: understanding smartphone users' trust in information security management , 2014, Secur. Commun. Networks.
[10] S. Grazioli. Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet , 2004 .
[11] JinKyu Lee,et al. The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet , 2012, Inf. Syst. Frontiers.
[12] John D. Lee,et al. Trust in Automation: Designing for Appropriate Reliance , 2004 .
[13] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[14] A. Alhogail. Improving IoT Technology Adoption through Improving Consumer Trust , 2018, Technologies.
[15] Leanne M. Hirshfield,et al. The Role of Human Operators' Suspicion in the Detection of Cyber Attacks , 2019, Cyber Law, Privacy, and Security.
[16] Heather Rosoff,et al. Heuristics and biases in cyber security dilemmas , 2013, Environment Systems and Decisions.