Education & Training.- Combating digital exclusion with cybersecurity training - an interview study with Swedish seniors.- Another look at cybersecurity awareness programs.- Cyber range exercises: potentials and open challenges for organisations.- An adaptive plug-and-play (PnP) interactive platform for an e-voting based cybersecurity curricula.- Cybersecurity training acceptance: a literature review.- Cyber security awareness and education support for home and hybrid workers.- On-campus hands-on ethical hacking course: design, deployment and lessons learned.- Planning for professional development in cybersecurity: a new curriculum design.- A comprehensive design framework for multi-disciplinary cyber security education.- Key elements for cybersafety education of primary school learners in South Africa.- Factors associated with cybersecurity culture: a. quantitative study of public e-health hospitals in South Africa.- Towards a framework for the personalization of cybersecurity awareness.-
Management, Policy & Skills.- A qualitative content analysis of actionable advice in Swedish public agencies' information security policies.- Business language for information security.- Check, check, check, we got those" - Catalogue use in information security risk management.- Proposed guidelines for website data privacy policies and an application thereof.- Towards roles and responsibilities in cyber security awareness framework for South African Small, Medium and Micro Enterprises (SMMEs).- Is your CISO burnt out yet? Examining demographic differences in workplace burnout amongst cyber security professionals.- An investigation into the cybersecurity skills gap in South Africa.- Cybersecurity-related behavior of personnel in the Norwegian industry.-
Evolving Threats & Attacks.- Its's more than just money: the real-world harms from ransomware attacks.- Cyberthreats in modern cars: responsibility and readiness of auto workshops.- Decreasing physical access bottlenecks through context-driven authentication.- Blockchain in oil and gas supply chain: a literature review from user security and privacy perspective.- Are people with cyber security training worse at checking phishing email addresses? Testing the automaticity of verifying the sender's address.- Content analysis of persuasion princples in mobile instant message phishing.- Six-year study of emails sent to unverified addresses.-
Social-Technical Factors.- Evaluating the risks of human factors associated with social media cybersecurity threats.- Online security attack experience and worries of young adults in the Kingdom of Saudi Arabia.- To catch a thief: examining socio-technical variables and developing a pathway framework for IP theft insider attacks.- Analyzing cyber security definitions for non-experts.- On using the task models for validation and evolution of usable security design patterns.- Chatbots: a framework for improving information security behaviors using ChatGPT.- Factors influencing Internet of Medical Things (IoMT) cybersecurity protective behaviors among healthcare workers.- The influence of interpersonal factors on telecommuting employees' cybercrime preventative behaviors during the pandemic.-
Research Methods.- A review of constructive alignment in information security educational research.- What goes around comes around; effects of unclear questionnaire items in information security research.