{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T07:39:22Z","timestamp":1776325162684,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T00:00:00Z","timestamp":1745884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001802","name":"University of Canberra","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001802","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Cybersecurity has traditionally been viewed as a technological challenge, but growing evidence emphasizes the pivotal role of human factors in shaping both vulnerabilities and resilience. This survey explores the critical intersection of human behaviour, decision-making, and organizational culture in cybersecurity, highlighting the need for strategies that effectively integrate technical and human-centric approaches. Key findings reveal persistent gaps, such as the underrepresentation of underserved communities, limited exploration of non-digital social engineering, and unresolved ethical challenges in Artificial Intelligence (AI)-driven cybersecurity tools. Additionally, existing frameworks often lack a standardized, implementable framework for assessing cybersecurity culture and fail to address generational and cultural diversity. These gaps underline the urgency of adaptive, inclusive solutions that align human behaviour with technical systems. To address these challenges, the proposed Human-Centric Cybersecurity Framework integrates psychological resilience, adaptive training, socio-technical approach, and ethical AI principles. The framework outlines practical strategies, including gamified learning, emotional intelligence training, and decision-support systems, to enhance cybersecurity awareness, reduce vulnerabilities, and promote organizational compliance. This paper advocates for an interdisciplinary approach to cybersecurity, emphasizing the importance of empowering individuals and fostering a culture of security. By bridging the gap between human and technical factors, it offers actionable insights for researchers and practitioners to build resilient and inclusive cybersecurity ecosystems capable of countering evolving threats.<\/jats:p>","DOI":"10.1007\/s10207-025-01032-0","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T09:20:11Z","timestamp":1745918411000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Human factors in cybersecurity: an interdisciplinary review and framework proposal"],"prefix":"10.1007","volume":"24","author":[{"given":"Kalam","family":"Khadka","sequence":"first","affiliation":[]},{"given":"Abu Barkat","family":"Ullah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"key":"1032_CR1","doi-asserted-by":"publisher","first-page":"51","DOI":"10.37458\/ssj.2.2.3","volume":"2","author":"E Kadena","year":"2021","unstructured":"Kadena, E., Gupi, M.: Human factors in cybersecurity. Secur. Sci. J. 2, 51\u201364 (2021)","journal-title":"Secur. Sci. J."},{"key":"1032_CR2","unstructured":"Berman, J., et al.: Twitter Investigation Report (2020). https:\/\/www.dfs.ny.gov\/Twitter_Report. Accessed 13 Dec 2024"},{"key":"1032_CR3","doi-asserted-by":"crossref","unstructured":"Corradini, I.: Security: Human Nature and Behaviour (2020)","DOI":"10.1007\/978-3-030-43999-6_2"},{"key":"1032_CR4","doi-asserted-by":"crossref","unstructured":"Rohan, R., Funilkul, S., Pal, D., Chutimaskul, W.: Understanding of human factors in cybersecurity: a systematic literature review. In: 2021 International Conference on Computational Performance Evaluation (ComPE), pp. 133\u2013140 (2021)","DOI":"10.1109\/ComPE53109.2021.9752358"},{"key":"1032_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07366981.2023.2211429","volume":"67","author":"N Robinson","year":"2023","unstructured":"Robinson, N.: Human factors security engineering: the future of cybersecurity teams. EDPACS 67, 1\u201317 (2023)","journal-title":"EDPACS"},{"issue":"2","key":"1032_CR6","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10111-021-00683-y","volume":"24","author":"A Pollini","year":"2021","unstructured":"Pollini, A., et al.: Leveraging human factors in cybersecurity: an integrated methodological approach. Cognit. Technol. Work 24(2), 371\u2013390 (2021). https:\/\/doi.org\/10.1007\/s10111-021-00683-y","journal-title":"Cognit. Technol. Work"},{"issue":"3","key":"1032_CR7","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1080\/08874417.2020.1845583","volume":"62","author":"A Georgiadou","year":"2022","unstructured":"Georgiadou, A., Mouzakitis, S., Bounas, K., Askounis, D.: A cyber-security culture framework for assessing organization readiness. J. Comput. Inf. Syst. 62(3), 452\u2013462 (2022). https:\/\/doi.org\/10.1080\/08874417.2020.1845583","journal-title":"J. Comput. Inf. Syst."},{"key":"1032_CR8","volume-title":"Synthesizing Research: A Guide for Literature Reviews","author":"H Cooper","year":"1998","unstructured":"Cooper, H.: Synthesizing Research: A Guide for Literature Reviews. Sage, Newcastle upon Tyne (1998)"},{"issue":"2","key":"1032_CR9","doi-asserted-by":"publisher","first-page":"205","DOI":"10.2307\/25148838","volume":"32","author":"WR King","year":"2008","unstructured":"King, W.R., Torkzadeh, G.: Information systems offshoring: research status and issues. MIS Q. 32(2), 205\u2013225 (2008)","journal-title":"MIS Q."},{"key":"1032_CR10","doi-asserted-by":"crossref","unstructured":"Jeong, J., Mihelcic, J., Oliver, G., Rudolph, C.: Towards an improved understanding of human factors in cybersecurity. In: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), pp. 338\u2013345. IEEE (2019)","DOI":"10.1109\/CIC48465.2019.00047"},{"issue":"1","key":"1032_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07366981.2021.1977026","volume":"66","author":"SA Chamkar","year":"2022","unstructured":"Chamkar, S.A., Maleh, Y., Gherabi, N.: The human factor capabilities in security operation Center (SOC). EDPACS 66(1), 1\u201314 (2022). https:\/\/doi.org\/10.1080\/07366981.2021.1977026","journal-title":"EDPACS"},{"issue":"2","key":"1032_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.19107\/IJISC.2021.02.07","volume":"10","author":"P L\u00f3pez-Aguilar","year":"2021","unstructured":"L\u00f3pez-Aguilar, P., Solanas, A.: The role of phishing victims\u2019 neuroticism: reasons behind the lack of consensus. Int. J. Inf. Secur. Cybercrime (Online) 10(2), 75\u201380 (2021). https:\/\/doi.org\/10.19107\/IJISC.2021.02.07","journal-title":"Int. J. Inf. Secur. Cybercrime (Online)"},{"issue":"2","key":"1032_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1080\/23800992.2019.1649122","volume":"21","author":"MJ Guitton","year":"2019","unstructured":"Guitton, M.J.: Manipulation through online sexual behavior: exemplifying the importance of human factor in intelligence and counterintelligence in the big data era. Int. J. Intell. Secur. Public Aff. 21(2), 117\u2013142 (2019). https:\/\/doi.org\/10.1080\/23800992.2019.1649122","journal-title":"Int. J. Intell. Secur. Public Aff."},{"issue":"12","key":"1032_CR14","doi-asserted-by":"publisher","first-page":"6042","DOI":"10.3390\/app12126042","volume":"12","author":"MA Siddiqi","year":"2022","unstructured":"Siddiqi, M.A., Pak, W., Siddiqi, M.A.: A study on the psychology of social engineering-based cyberattacks and existing countermeasures. Appl. Sci. 12(12), 6042 (2022). https:\/\/doi.org\/10.3390\/app12126042","journal-title":"Appl. Sci."},{"issue":"1","key":"1032_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/JSIT-02-2018-0028","volume":"21","author":"UD Ani","year":"2019","unstructured":"Ani, U.D., He, H., Tiwari, A.: Human factor security: evaluating the cybersecurity capacity of the industrial workforce. J. Syst. Inf. Technol. 21(1), 2\u201335 (2019). https:\/\/doi.org\/10.1108\/JSIT-02-2018-0028","journal-title":"J. Syst. Inf. Technol."},{"issue":"6","key":"1032_CR16","doi-asserted-by":"publisher","first-page":"5235","DOI":"10.1007\/s10639-020-10155-x","volume":"25","author":"Z Tan","year":"2020","unstructured":"Tan, Z., Beuran, R., Hasegawa, S., Jiang, W., Zhao, M., Tan, Y.: Adaptive security awareness training using linked open data datasets. Educ. Inf. Technol. 25(6), 5235\u20135259 (2020). https:\/\/doi.org\/10.1007\/s10639-020-10155-x","journal-title":"Educ. Inf. Technol."},{"key":"1032_CR17","doi-asserted-by":"crossref","unstructured":"Khadka, K., Ullah, A.B., Ma, W., Marroquin, E.M., Alem, Y.: A survey on the principles of persuasion as a social engineering strategy in phishing. In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1631\u20131638. IEEE (2023)","DOI":"10.1109\/TrustCom60117.2023.00222"},{"issue":"3\/2022","key":"1032_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.24818\/issn14531305\/26.3.2022.01","volume":"26","author":"V Greavu-Serban","year":"2022","unstructured":"Greavu-Serban, V., Constantin, F.: Aspects of social engineering and its modalities to countercharge and prevent it. Inform. Econ. 26(3\/2022), 5\u201315 (2022). https:\/\/doi.org\/10.24818\/issn14531305\/26.3.2022.01","journal-title":"Inform. Econ."},{"key":"1032_CR19","doi-asserted-by":"crossref","unstructured":"Pr\u00fcmmer, J.: The role of cognition in developing successful cybersecurity training programs: passive vs. active engagement. Lecture Notes in Computer Science (2024)","DOI":"10.1007\/978-3-031-61572-6_13"},{"issue":"1","key":"1032_CR20","doi-asserted-by":"publisher","first-page":"6291","DOI":"10.35444\/IJANA.2024.16108","volume":"16","author":"B Singh","year":"2024","unstructured":"Singh, B., Cheema, S.S.: Psychological defenses in cyberspace: unveiling the significance of cognitive shields in cybersecurity. Int. J. Adv. Netw. Appl. 16(1), 6291\u20136295 (2024). https:\/\/doi.org\/10.35444\/IJANA.2024.16108","journal-title":"Int. J. Adv. Netw. Appl."},{"issue":"23","key":"1032_CR21","doi-asserted-by":"publisher","first-page":"11269","DOI":"10.3390\/app112311269","volume":"11","author":"M Antunes","year":"2021","unstructured":"Antunes, M., Silva, C., Marques, F.: An integrated cybernetic awareness strategy to assess cybersecurity attitudes and behaviours in school context. Appl. Sci. 11(23), 11269 (2021). https:\/\/doi.org\/10.3390\/app112311269","journal-title":"Appl. Sci."},{"issue":"3","key":"1032_CR22","doi-asserted-by":"publisher","first-page":"450","DOI":"10.22364\/bjmc.2023.11.3.07","volume":"11","author":"KR Kont","year":"2023","unstructured":"Kont, K.R.: Information security awareness of librarians in the Baltic countries: a comparative analysis. Baltic J. Mod. Comput. 11(3), 450\u2013474 (2023). https:\/\/doi.org\/10.22364\/bjmc.2023.11.3.07","journal-title":"Baltic J. Mod. Comput."},{"issue":"2","key":"1032_CR23","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1108\/JIC-05-2019-0127","volume":"21","author":"G Bella","year":"2020","unstructured":"Bella, G.: Out to explore the cybersecurity planet. J. Intellect. Cap. 21(2), 291\u2013307 (2020). https:\/\/doi.org\/10.1108\/JIC-05-2019-0127","journal-title":"J. Intellect. Cap."},{"issue":"2","key":"1032_CR24","first-page":"7962","volume":"19","author":"S Park","year":"2022","unstructured":"Park, S., Lim, J., Kim, D.: The human factor of cybersecurity and the prevention and counter measures against cybercrime in South Korea. Webology 19(2), 7962\u20137976 (2022)","journal-title":"Webology"},{"key":"1032_CR25","doi-asserted-by":"crossref","unstructured":"Luan, K., Halvorsrud, R., Boletsis, C.: Evaluation of a tool to increase cybersecurity awareness among non-experts (SME employees). In: ICISSP 2023\u20149th International Conference on Information Systems Security and Privacy. SciTePress (2023)","DOI":"10.5220\/0011680500003405"},{"issue":"1","key":"1032_CR26","doi-asserted-by":"publisher","first-page":"12050","DOI":"10.1088\/1742-6596\/2867\/1\/012050","volume":"2867","author":"L Pr\u00e6stiin Jepsen","year":"2024","unstructured":"Pr\u00e6stiin Jepsen, L., H\u00e5kon Meland, P., Kaloudi, N.: Increasing maritime cybersecurity awareness through game-based learning. J. Phys.: Conf. Ser. 2867(1), 12050 (2024). https:\/\/doi.org\/10.1088\/1742-6596\/2867\/1\/012050","journal-title":"J. Phys.: Conf. Ser."},{"issue":"1","key":"1032_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.17083\/ijsg.v8i1.413","volume":"8","author":"E L\u00f6ffler","year":"2021","unstructured":"L\u00f6ffler, E., Schneider, B., Asprion, P.M., Zanwar, T.: CySecEscape 2.0\u2014a virtual escape room to raise cybersecurity awareness. Int. J. Serious Games 8(1), 59\u201370 (2021). https:\/\/doi.org\/10.17083\/ijsg.v8i1.413","journal-title":"Int. J. Serious Games"},{"issue":"2","key":"1032_CR28","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/10572317.2024.2315630","volume":"56","author":"KR Kont","year":"2024","unstructured":"Kont, K.R.: The role of libraries in creating a safer cyberspace: awareness of Estonian library employees in information security. Int. Inf. Libr. Rev. 56(2), 135\u2013149 (2024). https:\/\/doi.org\/10.1080\/10572317.2024.2315630","journal-title":"Int. Inf. Libr. Rev."},{"issue":"2","key":"1032_CR29","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1108\/ICS-07-2023-0116","volume":"32","author":"P Dornheim","year":"2024","unstructured":"Dornheim, P., Zarnekow, R.: Determining cybersecurity culture maturity and deriving verifiable improvement measures. Inf. Comput. Secur. 32(2), 179\u2013196 (2024). https:\/\/doi.org\/10.1108\/ICS-07-2023-0116","journal-title":"Inf. Comput. Secur."},{"issue":"1","key":"1032_CR30","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1108\/OCJ-02-2023-0004","volume":"4","author":"R Aschwanden","year":"2024","unstructured":"Aschwanden, R., Messner, C., H\u00f6chli, B., Holenweger, G.: Employee behavior: the psychological gateway for cyberattacks. Organ. Cybersecur. J.: Pract. Process People 4(1), 32\u201350 (2024). https:\/\/doi.org\/10.1108\/OCJ-02-2023-0004","journal-title":"Organ. Cybersecur. J.: Pract. Process People"},{"issue":"3","key":"1032_CR31","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014). https:\/\/doi.org\/10.1080\/0144929X.2012.708787","journal-title":"Behav. Inf. Technol."},{"issue":"2","key":"1032_CR32","doi-asserted-by":"publisher","first-page":"623","DOI":"10.18421\/TEM122-05","volume":"12","author":"L Huraj","year":"2023","unstructured":"Huraj, L., Lengyelfalusy, T., Hurajov\u00e1, A., Laj\u010din, D.: Measuring cyber security awareness: a comparison between computer science and media science students. TEM J. 12(2), 623\u2013633 (2023). https:\/\/doi.org\/10.18421\/TEM122-05","journal-title":"TEM J."},{"issue":"9","key":"1032_CR33","doi-asserted-by":"publisher","first-page":"386","DOI":"10.3390\/socsci11090386","volume":"11","author":"NS Sulaiman","year":"2022","unstructured":"Sulaiman, N.S., Fauzi, M.A., Wider, W., Rajadurai, J., Hussain, S., Harun, S.A.: Cyber-information security compliance and violation behaviour in organisations: a systematic review. Soc. Sci. (Basel) 11(9), 386 (2022). https:\/\/doi.org\/10.3390\/socsci11090386","journal-title":"Soc. Sci. (Basel)"},{"key":"1032_CR34","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.procs.2022.09.044","volume":"207","author":"S Polishchuk","year":"2022","unstructured":"Polishchuk, S., Ivanchenko, E., Bernas, M., Jancarczyk, D.: Concept of cybernetic ability estimation of a human-operator for next generation aircraft \u201cfly-by-wireless\u2019\u2019. Procedia Comput. Sci. 207, 118\u2013127 (2022). https:\/\/doi.org\/10.1016\/j.procs.2022.09.044","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"1032_CR35","doi-asserted-by":"publisher","first-page":"162","DOI":"10.2478\/bsaft-2023-0016","volume":"28","author":"SL Burton","year":"2023","unstructured":"Burton, S.L., Burrell, D.N., Nobles, C., Jones, L.A.: Exploring the nexus of cybersecurity leadership, human factors, emotional intelligence, innovative work behavior, and critical leadership traits. Sci. Bull. 28(2), 162\u2013175 (2023). https:\/\/doi.org\/10.2478\/bsaft-2023-0016","journal-title":"Sci. Bull."},{"issue":"4","key":"1032_CR36","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1080\/08874417.2021.1903367","volume":"62","author":"A Georgiadou","year":"2022","unstructured":"Georgiadou, A., Mouzakitis, S., Askounis, D.: Detecting insider threat via a cyber-security culture framework. J. Comput. Inf. Syst. 62(4), 706\u2013716 (2022). https:\/\/doi.org\/10.1080\/08874417.2021.1903367","journal-title":"J. Comput. Inf. Syst."},{"key":"1032_CR37","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2023.1277282","author":"RG Lugo","year":"2023","unstructured":"Lugo, R.G., S\u00fctterlin, S., Knox, B.J., Bukauskas, L., Brilingait\u0117, A., Maennel, O.M.: Editorial: The human factor in cyber security education. Front. Educ. (Lausanne) (2023). https:\/\/doi.org\/10.3389\/feduc.2023.1277282","journal-title":"Front. Educ. (Lausanne)"},{"issue":"3","key":"1032_CR38","doi-asserted-by":"publisher","first-page":"239","DOI":"10.11610\/isij.4617","volume":"46","author":"E Pavlova","year":"2020","unstructured":"Pavlova, E.: Enhancing the organisational culture related to cyber security during the university digital transformation. Inf. Secur. 46(3), 239\u2013249 (2020). https:\/\/doi.org\/10.11610\/isij.4617","journal-title":"Inf. Secur."},{"key":"1032_CR39","unstructured":"Searle, R., Renaud, K.: Trust and vulnerability in the cybersecurity context. In: Hawaii International Conference on System Science 2023 (2023)"},{"key":"1032_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107426","volume":"170","author":"A Yasin","year":"2024","unstructured":"Yasin, A., Fatima, R., JiangBin, Z., Afzal, W., Raza, S.: Can serious gaming tactics bolster spear-phishing and phishing resilience? Securing the human hacking in Information Security. Inf. Softw. Technol. 170, 107426 (2024). https:\/\/doi.org\/10.1016\/j.infsof.2024.107426","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"1032_CR41","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1080\/03088839.2022.2124464","volume":"51","author":"K Kanwal","year":"2024","unstructured":"Kanwal, K., Shi, W., Kontovas, C., Yang, Z., Chang, C.-H.: Maritime cybersecurity: Are onboard systems ready? Marit. Policy Manag. 51(3), 484\u2013502 (2024). https:\/\/doi.org\/10.1080\/03088839.2022.2124464","journal-title":"Marit. Policy Manag."},{"key":"1032_CR42","doi-asserted-by":"publisher","unstructured":"Nguyen, T.N.: Ollabench: Evaluating LLMs\u2019 Reasoning for Human-Centric Interdependent Cybersecurity (2024). https:\/\/doi.org\/10.48550\/arxiv.2406.06863","DOI":"10.48550\/arxiv.2406.06863"},{"issue":"MAY","key":"1032_CR43","doi-asserted-by":"publisher","first-page":"995","DOI":"10.3389\/fpsyg.2019.00995","volume":"10","author":"V Linkov","year":"2019","unstructured":"Linkov, V., Z\u00e1mecn\u00edk, P., Havl\u00edckov\u00e1, D., Pai, C.W.: Human factors in the cybersecurity of autonomous vehicles: trends in current research. Front. Psychol. 10(MAY), 995\u2013995 (2019). https:\/\/doi.org\/10.3389\/fpsyg.2019.00995","journal-title":"Front. Psychol."},{"issue":"3","key":"1032_CR44","doi-asserted-by":"publisher","first-page":"195","DOI":"10.2478\/jok-2019-0056","volume":"49","author":"J Ryczy\u0144ski","year":"2019","unstructured":"Ryczy\u0144ski, J.: Human factor as a determinant of reliability and safety of technical systems. J. KONBiN 49(3), 195\u2013220 (2019). https:\/\/doi.org\/10.2478\/jok-2019-0056","journal-title":"J. KONBiN"},{"key":"1032_CR45","doi-asserted-by":"publisher","unstructured":"Hareide, O.S., J\u00f8sok, \u00d8., Lund, M.S., Ostnes, R., Helkala, K.: Enhancing navigator competence by demonstrating maritime cyber security. J. Navig. 71(5), 1025\u20131039 (2018). https:\/\/doi.org\/10.1017\/S0373463318000164","DOI":"10.1017\/S0373463318000164"},{"key":"1032_CR46","doi-asserted-by":"publisher","unstructured":"Al-Mashhour, A., Alhogail, A.: Machine-learning-based user behavior classification for improving security awareness provision. Int. J. Adv. Comput. Sci. Appl. 14(8), 166\u2013178 (2023). https:\/\/doi.org\/10.14569\/IJACSA.2023.0140819","DOI":"10.14569\/IJACSA.2023.0140819"},{"key":"1032_CR47","doi-asserted-by":"publisher","unstructured":"Demertzis, K., Tziritas, N., Kikiras, P., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cognit. Comput. 3(1), 1\u201321 (2019). https:\/\/doi.org\/10.3390\/bdcc3010006","DOI":"10.3390\/bdcc3010006"},{"issue":"3","key":"1032_CR48","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2478\/hjbpa-2018-0024","volume":"9","author":"C Nobles","year":"2018","unstructured":"Nobles, C.: Botching human factors in cybersecurity in business organizations. Holist.: J. Bus. Public Adm. 9(3), 71\u201388 (2018). https:\/\/doi.org\/10.2478\/hjbpa-2018-0024","journal-title":"Holist.: J. Bus. Public Adm."},{"key":"1032_CR49","volume-title":"Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation","author":"RW Rogers","year":"1983","unstructured":"Rogers, R.W.: Cognitive and Physiological Processes in Fear Appeals and Attitude Change: A Revised Theory of Protection Motivation. Guilford Press, New York (1983)"},{"issue":"96","key":"1032_CR50","doi-asserted-by":"publisher","first-page":"80","DOI":"10.15388\/Im.2023.96.67","volume":"96","author":"K-R Kont","year":"2023","unstructured":"Kont, K.-R.: Cyber literacy skills of Estonians: activities and policies for encouraging knowledge-based cyber security attitudes. Inf. Media 96(96), 80\u201394 (2023). https:\/\/doi.org\/10.15388\/Im.2023.96.67","journal-title":"Inf. Media"},{"key":"1032_CR51","doi-asserted-by":"publisher","unstructured":"Kloba, L., Kloba, T.: Cyber threats of the banking sector in the conditions of the war in Ukraine. F\u00ecnansovo-kreditna d\u00ec\u00e2l?n\u00ecst?: problemi teor\u00ec\u00ec ta praktiki, 5(46):19\u201328 (2022) https:\/\/doi.org\/10.55643\/fcaptp.5.46.2022.3883","DOI":"10.55643\/fcaptp.5.46.2022.3883"},{"issue":"1","key":"1032_CR52","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/SCM-02-2020-0073","volume":"27","author":"A Creazza","year":"2022","unstructured":"Creazza, A., Colicchia, C., Spiezia, S., Dallari, F.: Who cares? Supply chain managers\u2019 perceptions regarding cyber supply chain risk management in the digital transformation era. Supply Chain Manag. 27(1), 30\u201353 (2022). https:\/\/doi.org\/10.1108\/SCM-02-2020-0073","journal-title":"Supply Chain Manag."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01032-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01032-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01032-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:12:05Z","timestamp":1750500725000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01032-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,29]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1032"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01032-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,29]]},"assertion":[{"value":"29 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"119"}}