{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T04:09:41Z","timestamp":1768622981096,"version":"3.49.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030544546","type":"print"},{"value":"9783030544553","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-54455-3_15","type":"book-chapter","created":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T12:07:37Z","timestamp":1596715657000},"page":"207-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Incorporating Psychology into Cyber Security Education: A Pedagogical Approach"],"prefix":"10.1007","author":[{"given":"Jacqui","family":"Taylor-Jackson","sequence":"first","affiliation":[]},{"given":"John","family":"McAlaney","sequence":"additional","affiliation":[]},{"given":"Jeffrey L.","family":"Foster","sequence":"additional","affiliation":[]},{"given":"Abubakar","family":"Bello","sequence":"additional","affiliation":[]},{"given":"Alana","family":"Maurushat","sequence":"additional","affiliation":[]},{"given":"John","family":"Dale","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,7]]},"reference":[{"key":"15_CR1","unstructured":"Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9 (2018). 1664-1078. https:\/\/www.frontiersin.org\/article\/10.3389\/fpsyg.2018.00744"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.cose.2016.05.006","volume":"61","author":"WD Kearney","year":"2016","unstructured":"Kearney, W.D., Kruger, H.A.: Can perceptual differences account for enigmatic information security behaviour in an organisation? Comput. Secur. 61, 46\u201358 (2016)","journal-title":"Comput. Secur."},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-016-0065-2","volume":"6","author":"C Iuga","year":"2016","unstructured":"Iuga, C., Nurse, J.R.C., Erola, A.: Baiting the hook: factors impacting susceptibility to phishing attacks. Hum.-Centric Comput. Inf. Sci. 6(1), 1\u201320 (2016). https:\/\/doi.org\/10.1186\/s13673-016-0065-2","journal-title":"Hum.-Centric Comput. Inf. Sci."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bursztein, E., et al.: Handcrafted fraud and extortion: manual account hijacking in the wild. In: Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, BC, Canada, pp. 347\u2013358. ACM (2014)","DOI":"10.1145\/2663716.2663749"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","volume":"39","author":"AC Johnston","year":"2015","unstructured":"Johnston, A.C., Warkentin, M., Siponen, M.: An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric. Mis Q. 39(1), 113\u2013134 (2015)","journal-title":"Mis Q."},{"key":"15_CR6","volume-title":"Social Engineering: The Act of Human Hacking","author":"C Hadnagy","year":"2011","unstructured":"Hadnagy, C.: Social Engineering: The Act of Human Hacking. Wiley Publishing Inc., Indianapolis (2011)"},{"issue":"2","key":"15_CR7","first-page":"58","volume":"41","author":"T Witkowski","year":"2010","unstructured":"Witkowski, T.: Thirty-five years of research on neuro-linguistic programming. NLP research data base. State of the art or pseudoscientific decoration? Pol. Psychol. Bull. 41(2), 58\u201366 (2010)","journal-title":"Pol. Psychol. Bull."},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Rogers, M.K.: The psyche of cybercriminals: a psycho-social perspective. In: Anal. Ghosh, G., Turrini, E. (eds.) Cybercrimes: A Multidisciplinary Analysis, pp. 217\u2013235. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-13547-7_14","DOI":"10.1007\/978-3-642-13547-7_14"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.diin.2015.07.002","volume":"14","author":"R Seebruck","year":"2015","unstructured":"Seebruck, R.: A typology of hackers: classifying cyber malfeasance using a weighted arc circumplex model. Digit. Invest. 14, 36\u201345 (2015)","journal-title":"Digit. Invest."},{"key":"15_CR10","volume-title":"We Are Anonymous","author":"P Olson","year":"2012","unstructured":"Olson, P.: We Are Anonymous. Back Bay Books, New York (2012)"},{"issue":"2","key":"15_CR11","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1207\/s15327965pli0302_28","volume":"3","author":"JM Darley","year":"1992","unstructured":"Darley, J.M.: Social organization for the production of evil. Psychol. Inq. 3(2), 199\u2013218 (1992)","journal-title":"Psychol. Inq."},{"issue":"2","key":"15_CR12","first-page":"75","volume":"65","author":"MA Wallach","year":"1962","unstructured":"Wallach, M.A., Kogan, N., Bem, D.J.: Group influence on individual risk-taking. J. Abnorm. Psychol. 65(2), 75 (1962)","journal-title":"J. Abnorm. Psychol."},{"key":"15_CR13","volume-title":"Groups and Individuals: Explanations in Social Psychology","author":"W Doise","year":"1978","unstructured":"Doise, W.: Groups and Individuals: Explanations in Social Psychology. Cambridge University Press, Cambridge (1978)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Sheng, S., et al.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010, Atlanta, Georgia, USA, pp. 373\u2013382. ACM (2010)","DOI":"10.1145\/1753326.1753383"},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1111\/j.1745-6606.2005.00018.x","volume":"39","author":"NJ Rifon","year":"2005","unstructured":"Rifon, N.J., LaRose, R., Choi, S.M.: Your privacy is sealed: effects of web privacy seals on trust and personal disclosures. J. Consum. Aff. 39(2), 339\u2013362 (2005)","journal-title":"J. Consum. Aff."},{"key":"15_CR16","volume-title":"Cyberpsychology and New Media: A Thematic Reader","author":"A Power","year":"2014","unstructured":"Power, A., Kirwan, G.: Cyberpsychology and New Media: A Thematic Reader. Psychology Press, New York (2014)"},{"key":"15_CR17","unstructured":"Utz, S., Kramer, N.: The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychol.: J. Psychosoc. Res. Cyberspace 3(2) (2009)"},{"issue":"8","key":"15_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1076211.1076242","volume":"48","author":"MB Schmidt","year":"2005","unstructured":"Schmidt, M.B., Arnett, K.P.: Spyware: a little knowledge is a wonderful thing. Commun. ACM 48(8), 67\u201370 (2005)","journal-title":"Commun. ACM"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-540-68164-9_5","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"B Schneier","year":"2008","unstructured":"Schneier, B.: The Psychology of Security. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 50\u201379. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68164-9_5"},{"key":"15_CR20","unstructured":"Kahneman, D.: Thinking Fast and Slow, 1st edn. 499 pp. Penguin, Westminster (2011)"},{"issue":"3","key":"15_CR21","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., et al.: User acceptance of information technology: toward a unified view. Mis Q. 27(3), 425\u2013478 (2003)","journal-title":"Mis Q."},{"key":"15_CR22","unstructured":"Band, S.R., et al. Comparing insider it sabotage and espionage: a model-based analysis. Software Engineer Institute, Carnegie Mellon (2006)"},{"issue":"2","key":"15_CR23","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/0263514950130206","volume":"13","author":"J Radford","year":"1995","unstructured":"Radford, J., Holdstock, L.: Gender differences in higher education aims between computing and psychology students. Res. Sci. Technol. Educ. 13(2), 163\u2013176 (1995)","journal-title":"Res. Sci. Technol. Educ."},{"issue":"1","key":"15_CR24","doi-asserted-by":"crossref","first-page":"21","DOI":"10.53841\/bpsptr.2008.14.1.21","volume":"14","author":"J Taylor","year":"2008","unstructured":"Taylor, J.: Teaching psychology to computing students. Psychol. Teach. Rev. 14(1), 21\u201329 (2008)","journal-title":"Psychol. Teach. Rev."},{"key":"15_CR25","doi-asserted-by":"crossref","DOI":"10.4135\/9781452233604","volume-title":"Moral Development and Reality: Beyond the Theories of Kohlberg and Hoffman","author":"JC Gibbs","year":"2003","unstructured":"Gibbs, J.C.: Moral Development and Reality: Beyond the Theories of Kohlberg and Hoffman. SAGE Publications, Newcastle upon Tyne (2003)"},{"key":"15_CR26","unstructured":"Making things hard on yourself, but in a good way: creating desirable difficulties to enhance learning. In: Psychology and the Real World. Essays Illustrating Fundamental Contributions to Society, no. 2, pp. 59\u201368 (2011)"},{"key":"15_CR27","doi-asserted-by":"publisher","unstructured":"Linn, M.C., Chang, H.-Y., Chiu, J.L., Zhang, Z.H., McElhaney, K.: Can desirable difficulties overcome deceptive clarity in scientific visualizations? In: Benjamin, A.S. (ed.) Successful Remembering and Successful Forgetting: A Festschrift in honor of Robert A. Bjork (pp. 235\u2013258). Taylor & Francis (2011). https:\/\/doi.org\/10.4324\/9780203842539","DOI":"10.4324\/9780203842539"},{"key":"15_CR28","unstructured":"Bandura, A.: Social cognitive theory. In: Ewen, R.B. (ed.) An Introduction to the Theories of Personality, pp. 365\u2013386. Lawrence Erlbraun Associates, Mahwa (2003)"},{"issue":"Pt 4","key":"15_CR29","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1348\/000712601162400","volume":"92","author":"A Steptoe","year":"2001","unstructured":"Steptoe, A., Wardle, J.: Locus of control and health behaviour revisited: a multivariate analysis of young adults from 18 countries. Br. J. Psychol. 92(Pt 4), 659\u2013672 (2001)","journal-title":"Br. J. Psychol."},{"key":"15_CR30","volume-title":"Ethical Hacking","author":"A Maurushat","year":"2019","unstructured":"Maurushat, A.: Ethical Hacking. University of Ottawa Press, Ottawa (2019)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Maurushat, A., Bello, A., Bragg, B.: Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware. Indian J. Law Technol. 15(2) (2019)","DOI":"10.55496\/LUGJ4718"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-54455-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T11:27:42Z","timestamp":1723375662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-54455-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030544546","9783030544553"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-54455-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kota Kinabalu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc20.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"162","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}