[
Aldabbas, M., & Teufel, B. (2016). Human aspects of smart technologies’ security: the role of human failure. Journal of Electronic Science and Technology, 14(4), 311-318.
]Search in Google Scholar
[
Aldawood, H., & Skinner, G. (2018, December). Educating and raising awareness on cyber security social engineering: A literature review. In 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, 62-68. IEEE.
]Search in Google Scholar
[
American International Group (AIG). (n.d.). Human cyber risk: The first line of defence. Available at: https://www.aig.co.uk/content/dam/aig/emea/united-kingdom/documents/Insights/cyber-human-factor.pdf.
]Search in Google Scholar
[
Andersson, I., Bjursell, L., & Palm, I. (2023). Hack the Human: A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.
]Search in Google Scholar
[
Barton, T. (2023, April 20). The human attack vector: Social engineering. Available at: https://www.nextdlp.com/resources/blog/human-attack-vector-social-engineering.
]Search in Google Scholar
[
Benson, V., McAlaney, J., & Frumkin, L.A. (2019). Emerging threats for the human element and countermeasures in the current cyber security landscape. In Cyber Law, Privacy, and Security: Concepts, methodologies, tools, and applications, 1264-1269. IGI Global.
]Search in Google Scholar
[
Boy, G.A. (2017). Human-centered design of complex systems: An experience-based approach. Design Science, 3.
]Search in Google Scholar
[
Bone, J. (2017). Cognitive Hack: The New Battleground in Cybersecurity... the Human Mind. CRC Press.
]Search in Google Scholar
[
Contreras, J.M. (2022, March 22). Why tech products should be designed alongside psychologists. Available at: https://thedecisionlab.com/insights/technology/why-tech-products-should-be-designed-alongside-psychologists.
]Search in Google Scholar
[
Coatesworth, B. (2023). The psychology of social engineering. Cyber Security: A Peer-Reviewed Journal, 6(3), 261-274.
]Search in Google Scholar
[
Coffey, J.W. (2017). Ameliorating sources of human error in cybersecurity: technological and human-centered approaches. In the 8th International Multi-Conference on Complexity, Informatics, and Cybernetics, Pensacola, 85-88.
]Search in Google Scholar
[
Cybenko, G., Giani, A., & Thompson, P. (2002). Cognitive hacking: A battle for the mind. Computer, 35(8), 50-56.
]Search in Google Scholar
[
Cybriant. (n.d.). Understanding cybersecurity attack vectors and protecting your data. Available at: https://cybriant.com/understanding-cybersecurity-attack-vectors.
]Search in Google Scholar
[
Evans, M., Maglaras, L.A., He, Y., & Janicke, H. (2016). Human behaviour as an aspect of cybersecurity assurance. Security and Communication Networks, 9(17), 4667-4679.
]Search in Google Scholar
[
Federal Bureau of Investigations (FBI). (2021). Federal Bureau of Investigation: Internet Crime Report 2021. Available at: https://www.ic3.gov/.
]Search in Google Scholar
[
Fritsch, L., Jaber, A., & Yazidi, A. (2022, May). An overview of artificial intelligence used in malware. In Symposium of the Norwegian AI Society, 41-51. Cham: Springer International Publishing.
]Search in Google Scholar
[
Guastello, S.J. (2023). Human factors engineering and ergonomics: A systems approach. CRC Press.
]Search in Google Scholar
[
Godin, A. (2017). Using COIN Doctrine to improve cyber security policies. Available at: https://www.sans.org/white-papers/37557/.
]Search in Google Scholar
[
Hiesgen, R., Nawrocki, M., Schmidt, T.C., & Wählisch, M. (2022). The race to the vulnerable: Measuring the log4j shell incident. arXiv preprint arXiv:2205.02544.
]Search in Google Scholar
[
Hollnagel, E. (2016). The nitty-gritty of human factors. Human factors and ergonomics in practice: Improving system performance and human well-being in the real world, 45-64.
]Search in Google Scholar
[
Jahankhani, H., Al-Nemrat, A., & Hosseinian-Far, A. (2014). Cybercrime classification and characteristics. In Cyber crime and cyber terrorism investigator’s handbook, 149-164. Syngress.
]Search in Google Scholar
[
Janczewski, L.J., & Fu, L. (2010, October). Social engineering-based attacks: Model and New Zealand perspective. In Proceedings of the International Multiconference on ComputerScience and Information Technology, 847-853. IEEE.
]Search in Google Scholar
[
Jeong, J., Mihelcic, J., Oliver, G., & Rudolph, C. (2019, December). Towards an improved understanding of human factors in cybersecurity. In 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 338-345. IEEE.
]Search in Google Scholar
[
Joinson, A., & van Steen, T. (2018). Human aspects of cyber security: Behaviour or culture change? Cyber Security: A Peer-Reviewed Journal, 1(4), 351-360.
]Search in Google Scholar
[
Jones, D. (2023, June 05). Cybercriminals target C-suite, family members with sophisticated attacks. Available at: https://www.cybersecuritydive.com/news/cybercriminals-target-c-suite/652052/.
]Search in Google Scholar
[
Kamoun, F., Iqbal, F., Esseghir, M.A., & Baker, T. (2020, October). AI and machine learning: A mixed blessing for cybersecurity. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1-7. IEEE.
]Search in Google Scholar
[
Kim, K., Alfouzan, F.A., & Kim, H. (2021). Cyber-attack scoring model based on the offensive cybersecurity framework. Applied Sciences, 11(16), 7738.
]Search in Google Scholar
[
Maalem Lahcen, R.A., Caulkins, B., Mohapatra, R., & Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity. Cybersecurity, 3(1), 1-18.
]Search in Google Scholar
[
Maathuis, C., & Chockalingam, S. (2022, June). Responsible digital security behaviour: Definition and assessment model. In European Conference on Cyber Warfare and Security, Vol. 21, No. 1.
]Search in Google Scholar
[
MIT and DarkTrace. (2021, April 8). Preparing for AI-enabled cyberattacks. MIT Technology Review Insights. Technologyreview.com. Available at: https://www.technologyreview.com/2021/04/08/1021696/preparing-for-ai-enabled-cyberattacks/.
]Search in Google Scholar
[
Mohammad, T., Hussin, N.A.M., & Husin, M.H. (2022). Online safety awareness and human factors: An application of the theory of human ecology, Technology in Society, 68, 101823.
]Search in Google Scholar
[
Montasari, R., Hosseinian-Far, A., & Hill, R. (2018). Policies, innovative self-adaptive techniques and understanding psychology of cybersecurity to counter adversarial attacks in network and cyber environments. Cyber criminology, 71-93.
]Search in Google Scholar
[
Mortazavi-Alavi, R. (2016). A risk-driven investment model for analysing human factors in information security (Doctoral dissertation, University of East London).
]Search in Google Scholar
[
Moustafa, A.A., Bello, A., & Maurushat, A. (2021). The role of user behaviour in improving cyber security management. Frontiers in Psychology, 12, 561011.
]Search in Google Scholar
[
Nobles, C. (2018). Botching human factors in cybersecurity in business organizations. HOLISTICA–Journal of Business and Public Administration, 9(3), 71-88.
]Search in Google Scholar
[
Nobles, C. (2019). Establishing human factors programs to mitigate blind spots in cybersecurity. MWAIS 2019 Proceedings, 22.
]Search in Google Scholar
[
Nobles, C., Robinson, N., & Cunningham, M.(2022, September). Straightfrom the human factors professionals’ mouths: The Need to Teach Human Factors in Cybersecurity. In Proceedings of the 23rd Annual Conference on Information Technology Education, 157-158.
]Search in Google Scholar
[
Nobles, C. (2022). Stress, burnout, and security fatigue in cybersecurity: A human factors problem. HOLISTICA–Journal of Business and Public Administration, 13(1), 49-72.
]Search in Google Scholar
[
Nobles, C. (2022a, March) The Dunning-Kruger Effect around human factors in cybersecurity, Top Cyber News Magazine. Avaialble at: https://www.linkedin.com/company/topcybernews/.
]Search in Google Scholar
[
Patient Safety Network (PSN). (2019, September 07). Human factors engineering. Available at: https://psnet.ahrq.gov/primer/human-factors-engineering#.
]Search in Google Scholar
[
Pratt, M.K. (2023, July 04). Why cyberpsychology is such an important part of effective cybersecurity. Available at: https://www.csoonline.com/article/643967/whycyberpsychology-is-such-an-important-part-of-effective-cybersecurity.html.
]Search in Google Scholar
[
Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021, June). Human factors in cybersecurity: A scoping review, In The 12th International Conference on Advances in Information Technology, 1-11.
]Search in Google Scholar
[
Robinson, N. (2023). Human factors security engineering: the future of cybersecurity teams. EDPACS, 1-17.
]Search in Google Scholar
[
Rogers, W.A., & McGlynn, S.A. (2018). Human factors and ergonomics: History, scope, and potential. In Human Factors and Ergonomics for the Gulf Cooperation Council, 1-20. CRC Press.
]Search in Google Scholar
[
Sharit, J. (2012). Human error and human reliability analysis. Handbook of human factors and ergonomics, 734-800.
]Search in Google Scholar
[
Smeets, M. (2018). The strategic promise of offensive cyber operations. Strategic Studies Quarterly, 12(3), 90-113.
]Search in Google Scholar
[
Stein, A. (2018, June 22). Few minutes with Alexander Stein. CISO Mag.com. Available at: https://www.cisomag.com/few-minutes-with-alexander-stein/.
]Search in Google Scholar
[
Taylor-Jackson, J., McAlaney, J., Foster, J.L., Bello, A., Maurushat, A., & Dale, J. (2020). Incorporating psychology into cyber security education: a pedagogical approach. In Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers 24, 207-217. Springer International Publishing.
]Search in Google Scholar
[
Tetaly, M. & Kulkarni, P. (2022, October). Artificial intelligence in cyber security – A threat or a solution. In AIP Conference Proceedings 2519, p. 030036.
]Search in Google Scholar
[
Uren, T., Hogeveen, B., and Hanson, F. (2018, July 04). Defining offensive cyber capabilities. Australian Strategic Policy Institute. Available at: https://www.aspi.org.au/report/defining-offensive-cyber-capabilities.
]Search in Google Scholar
[
U.S. Office of the Chairman of the Joint Chiefs of Staff. Cyberspace Operations. Joint Publication (J.P.) 3-12. Washington, DC: CJCS, 8 June 2018.
]Search in Google Scholar
[
Verizon. (2023). Data breach investigations report. Available at: https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/.
]Search in Google Scholar
[
Wang, Z., Sun, L., & Zhu, H. (2020). Defining Social Engineering in Cybersecurity. IEEE Access, 8, 85094-85115. Available at: https://doi.org/10.1109/access.2020.2992807.
]Search in Google Scholar
[
Wiederhold, B.K. (2014). The role of psychology in enhancing cybersecurity. Cyberpsychology, Behavior, and Social Networking, 17(3), 131-132.
]Search in Google Scholar
[
Wilson, S., Hamilton, & Stallbaum, S. (2020, May 26). The unaddressed gap in cybersecurity: Human performance. MIT Sloan Management Review. Available at: https://sloanreview.mit.edu/article/the-unaddressed-gap-in-cybersecurity-human-performance/.
]Search in Google Scholar
[
Wirkuttis, N. & Klein, H. (2017). Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), 103-119.
]Search in Google Scholar
[
Yamin, M.M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber attacks. Journal of Information Security and Applications, 57, 102722.
]Search in Google Scholar
[
Zurowski, S., Lord, G., & Baggili, I. (2022, August). A quantitative analysis of offensive cyber operations (OCO) automation tools. In Proceedings of the 17th International Conference on Availability, Reliability and Security, 1-11.
]Search in Google Scholar