• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4633441)   Today's Articles (2715)   Subscriber (49959)
For: Sawyer BD, Hancock PA. Hacking the Human: The Prevalence Paradox in Cybersecurity. Hum Factors 2018;60:597-609. [PMID: 29986155 DOI: 10.1177/0018720818780472] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Number Cited by Other Article(s)
1
Sarno DM, Black J. Who Gets Caught in the Web of Lies?: Understanding Susceptibility to Phishing Emails, Fake News Headlines, and Scam Text Messages. HUMAN FACTORS 2024;66:1742-1753. [PMID: 37127397 DOI: 10.1177/00187208231173263] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/03/2023]
2
Guidetti OA, Speelman C, Bouhlas P. A review of cyber vigilance tasks for network defense. FRONTIERS IN NEUROERGONOMICS 2023;4:1104873. [PMID: 38234467 PMCID: PMC10790933 DOI: 10.3389/fnrgo.2023.1104873] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/22/2022] [Accepted: 03/29/2023] [Indexed: 01/19/2024]
3
Xu T, Singh K, Rajivan P. Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks. APPLIED ERGONOMICS 2023;108:103908. [PMID: 36403509 DOI: 10.1016/j.apergo.2022.103908] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Revised: 06/10/2022] [Accepted: 09/20/2022] [Indexed: 06/16/2023]
4
Armstrong ME, Jones KS, Namin AS. How Perceptions of Caller Honesty Vary During Vishing Attacks That Include Highly Sensitive or Seemingly Innocuous Requests. HUMAN FACTORS 2023;65:275-287. [PMID: 33934614 DOI: 10.1177/00187208211012818] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
5
Ask TF, Kullman K, Sütterlin S, Knox BJ, Engel D, Lugo RG. A 3D mixed reality visualization of network topology and activity results in better dyadic cyber team communication and cyber situational awareness. Front Big Data 2023;6:1042783. [PMID: 36777449 PMCID: PMC9911685 DOI: 10.3389/fdata.2023.1042783] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/13/2022] [Accepted: 01/10/2023] [Indexed: 01/28/2023]  Open
6
Sturman D, Valenzuela C, Plate O, Tanvir T, Auton JC, Bayl-Smith P, Wiggins MW. The role of cue utilization in the detection of phishing emails. APPLIED ERGONOMICS 2023;106:103887. [PMID: 36037654 DOI: 10.1016/j.apergo.2022.103887] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/19/2021] [Revised: 08/17/2022] [Accepted: 08/18/2022] [Indexed: 06/15/2023]
7
Chen J, Ge H, Li N, Proctor RW. What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors. HUMAN FACTORS 2022;64:1331-1350. [PMID: 33861174 DOI: 10.1177/00187208211004288] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
8
Sarno DM, Neider MB. So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility. HUMAN FACTORS 2022;64:1379-1403. [PMID: 33835881 DOI: 10.1177/0018720821999174] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
9
Designing effective masking strategies for cyberdefense through human experimentation and cognitive models. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102671] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
10
Aggarwal P, Moisan F, Gonzalez C, Dutt V. Learning About the Effects of Alert Uncertainty in Attack and Defend Decisions via Cognitive Modeling. HUMAN FACTORS 2022;64:343-358. [PMID: 32954818 DOI: 10.1177/0018720820945425] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
11
Caspi A, Sayag M, Gross M, Weinstein Z, Etgar S. The effects of personal values and message values on vulnerability to phishing. PERSONALITY AND INDIVIDUAL DIFFERENCES 2022. [DOI: 10.1016/j.paid.2021.111335] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
12
Pawlicka A, Pawlicki M, Kozik R, Choraś RS. A Systematic Review of Recommender Systems and Their Applications in Cybersecurity. SENSORS 2021;21:s21155248. [PMID: 34372489 PMCID: PMC8347790 DOI: 10.3390/s21155248] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/04/2021] [Revised: 07/28/2021] [Accepted: 07/29/2021] [Indexed: 11/18/2022]
13
Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review. SENSORS 2021;21:s21155119. [PMID: 34372354 PMCID: PMC8348467 DOI: 10.3390/s21155119] [Citation(s) in RCA: 21] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/29/2021] [Revised: 07/15/2021] [Accepted: 07/16/2021] [Indexed: 01/05/2023]
14
Monteith S, Bauer M, Alda M, Geddes J, Whybrow PC, Glenn T. Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Curr Psychiatry Rep 2021;23:18. [PMID: 33660091 PMCID: PMC7927777 DOI: 10.1007/s11920-021-01228-w] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Accepted: 01/21/2021] [Indexed: 11/30/2022]
15
Montañez R, Golob E, Xu S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Front Psychol 2020;11:1755. [PMID: 33101096 PMCID: PMC7554349 DOI: 10.3389/fpsyg.2020.01755] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/19/2020] [Accepted: 06/25/2020] [Indexed: 11/13/2022]  Open
16
Sarno DM, Lewis JE, Bohil CJ, Neider MB. Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults. HUMAN FACTORS 2020;62:704-717. [PMID: 31237787 DOI: 10.1177/0018720819855570] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
17
Neigel AR, Claypoole VL, Waldfogle GE, Acharya S, Hancock GM. Holistic cyber hygiene education: Accounting for the human factors. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101731] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
18
Singh K, Aggarwal P, Rajivan P, Gonzalez C. Training to Detect Phishing Emails: Effects of the Frequency of Experienced Phishing Emails. ACTA ACUST UNITED AC 2019. [DOI: 10.1177/1071181319631355] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
19
Neigel AR, Claypoole VL, Smith SL, Waldfogle GE, Fraulini NW, Hancock GM, Helton WS, Szalma JL. Engaging the human operator: a review of the theoretical support for the vigilance decrement and a discussion of practical applications. THEORETICAL ISSUES IN ERGONOMICS SCIENCE 2019. [DOI: 10.1080/1463922x.2019.1682712] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
20
Linkov V, Zámečník P, Havlíčková D, Pai CW. Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research. Front Psychol 2019;10:995. [PMID: 31130903 PMCID: PMC6509749 DOI: 10.3389/fpsyg.2019.00995] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2018] [Accepted: 04/15/2019] [Indexed: 11/13/2022]  Open
21
Hancock PA. Neuroergonomics: Where the Cortex Hits the Concrete. Front Hum Neurosci 2019;13:115. [PMID: 31031608 PMCID: PMC6474394 DOI: 10.3389/fnhum.2019.00115] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Key Words] [Track Full Text] [Download PDF] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/28/2018] [Accepted: 03/14/2019] [Indexed: 11/13/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA