.- Awareness & Education.
.- Thematic Analysis of Cybersecurity Awareness Strategies and Approaches.
.- Investigating Cyber-Situational Awareness for Cyber Ranges in Offshore Operations.
.- "I'm in" - Portrayal of Hacking in Movies and TV Shows.
.- Cybersecurity and emerging technologies: Investigating individuals' ability to identify deepfake media.
.- Learning to Deceive: Attacker Skill Acquisition in a Vishing Simulation Study.
.- Transmission, Evaluation, Culture- Internal Communications as a Catalyst for Information Security Awareness.
.- Theoretical Underpinnings for Consideration in the Design of a Secure Programming Course.
.- Cybersecurity Vulnerabilities of Female Learners: The Case of South African Marginalised School.
.- Supporting cyber security knowledge and skills in non-computing disciplines.
.- Multidisciplinary Pathways into Cyber Threat Intelligence Roles: Mapping Knowledge Areas and Transferable Skills.
.-
Security Culture.
.- How Digital Evidence Seizure Times Affect Swedish Citizens' Willingness to Report Crimes.
.- A Cyber4Dev Security Culture Model for SMMEs in South Africa.
.- Reimagining AI as a Psychosocial Buffer: A Conceptual Model for Mitigating Burnout and Quiet Quitting in Cybersecurity.
.- Factors Contributing to Cybersecurity Fatigue.
.- Increasing a Product's Perceived Cybersecurity by Indicating the Country of Origin.
.-
Privacy.
.- Digital Coercive Control: Towards Understanding Item Finder Misuse.
.- "Of course, that's not feasible for everyone" - Compiling and Evaluating Privacy Recommendations in Expert Interviews.
.- A Holistic Profile for the Information Privacy Aware and Competent User.
.- Reducing Role Ambiguity for Organisational Data Privacy Compliance.
.- Security and Privacy Implications of AI-Driven Digital Phenotyping.
.- Adopting LLMs in Internet of Cloud Ecosystems: Identifying the Key Privacy Challenges.
.- Public Perceptions of Trustworthy AI: Insights from a Longitudinal Study of UK News Media.
.-
Technical Attacks & Defenses.
.- Beyond phishing: A human-centered exploration of cyber incident reporting.
.- Words matter: Applying the Elaboration Likelihood Model to Examine the persuasive cues evident in True and Fake News about the 'Indigenous Voice to Parliament'.
.- A Structured Approach to Log Design: Addressing Security and Compliance Gaps in Software Development.
.- A Literature Review on Rule-Based Systems as Decision Support Systems.
.- Online Authentication for Users with Visual Disabilities.
.- SoK: A Systematic Review of Context- and Behavior-Aware Adaptive Authentication in Mobile Environments.
.- On the Inconsistency of Update-Related Vulnerabilities.
.- Cybersecurity Strategies to Mitigate Insider Threats in Multi-Cloud Environments.