{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T12:39:18Z","timestamp":1772109558572,"version":"3.50.1"},"reference-count":66,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Comput. Sci."],"abstract":"<jats:p>Humans play a vital role in designing, developing, implementing, and using technical systems. For this reason, it is crucial to keep humans in the loop at each phase of these systems to make them more secure and user-friendly. There needs to be a balance between using these systems securely and making them easy to use. Today, under pressure to secure our systems from cyberattacks, we primarily focus on making them secure but often overlook making them easy to use. Thus, the objective of this paper is to provide a human-centric perspective on cybersecurity and to introduce a human-centric framework that enables Industry 5.0, where humans have direct interaction with systems and solutions that are more customer-oriented. To carry out this research, the authors have applied the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to investigate human-centric research over a 10-year period, from 2015 to 2025. The literature shows that most human-centric research contributions are well-balanced, with conceptual, experimental, and survey approaches each accounting for approximately 64% of the total, indicating a mature blend of theoretical and applied research. These studies are focused on developing structured, strategic approaches that integrate human factors into cybersecurity practices across sectors such as education, government, health, software, smart home networks, and others. To conduct this research, the authors have prepared an anonymous questionnaire with fundamental questions about secure system\u2019s design, which can be easily used. The evaluation results show that frequent password resets (33.3%) and frequent authentication (26.7%) are the most \u201cannoying\u201d cybersecurity measures. Additionally, most respondents consider biometric login the most user-friendly security feature, followed by single sign-on and automatic security patch updates. What is missing in existing literature and studies is a holistic perspective on human-centrism, beyond mere ease of use. We aim to cover that blind spot by introducing our independently developed framework in this paper.<\/jats:p>","DOI":"10.3389\/fcomp.2026.1764808","type":"journal-article","created":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:54:17Z","timestamp":1772106857000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Annoyed by cybersecurity? Human-centric perspectives on cybersecurity"],"prefix":"10.3389","volume":"8","author":[{"given":"Ravdeep","family":"Kour","sequence":"first","affiliation":[{"name":"Division of Operation and Maintenance Engineering, Lulea University of Technology","place":["Lule\u00e5, Sweden"]}]},{"given":"Ramin","family":"Karim","sequence":"additional","affiliation":[{"name":"Division of Operation and Maintenance Engineering, Lulea University of Technology","place":["Lule\u00e5, Sweden"]}]},{"given":"Annika","family":"W\u00e4genbauer","sequence":"additional","affiliation":[{"name":"Cybersecurity Redefined","place":["Stuttgart, Germany"]}]}],"member":"1965","published-online":{"date-parts":[[2026,2,26]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s10207-025-01180-3","article-title":"Selfish or malicious: price of malice in human-centric security decision-making for attack graph-based interdependent systems","volume":"25","author":"Abdallah","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"ref2","first-page":"80","volume-title":"International Conference on Software Defined Systems (SDS)","author":"Al Ansari","year":"2024"},{"key":"ref3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.4018\/IJTHI.2017010103","article-title":"User-friendly security patterns for designing social network websites","volume":"13","author":"Alemerien","year":"2017","journal-title":"Int. J. Technol. Hum. Interact."},{"key":"ref4","author":"Ayodele","year":"2025"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/CCGridW59191.2023.00017","volume-title":"2023 IEEE\/ACM 23rd international symposium on cluster, cloud and internet computing workshops (CCGridW)","author":"Beerman","year":"2023"},{"key":"ref6","first-page":"95","volume-title":"Predicting health behaviour: Research and practice with social cognition models","author":"Boer","year":"1996"},{"key":"ref7","doi-asserted-by":"publisher","author":"Breque","year":"2021","DOI":"10.2777\/308407"},{"key":"ref8","volume-title":"The security of self: A human-centric approach to cybersecurity","author":"Bush","year":"2025"},{"key":"ref9","year":"2023"},{"key":"ref10","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.62915\/2472-2707.1028","article-title":"A case study in the implementation of a human-centric higher education cybersecurity program","volume":"2018","author":"Coffey","year":"2018","journal-title":"J. Cybersecur. Educ. Res. Pract."},{"key":"ref12","first-page":"33","article-title":"Self-determination theory: when mind mediates behavior","author":"Deci","year":"1980","journal-title":"J. Mind Behav."},{"key":"ref13","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1017\/s0892679418000618","article-title":"Toward a human-centric approach to cybersecurity","volume":"32","author":"Deibert","year":"2018","journal-title":"Ethics Int. Aff."},{"key":"ref14","volume-title":"A human-centric cyber security training tool for prioritizing MSNAs","author":"Depassier","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","first-page":"58","DOI":"10.59185\/cd2a2q06","article-title":"The relationship between human-centric cybersecurity and cybercrime","volume":"11","author":"Dikito","year":"2023","journal-title":"J. Inf. Technol."},{"key":"ref16","year":"2025"},{"key":"ref17","first-page":"857","author":"Duncan","year":"2012"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"242","DOI":"10.4018\/978-1-6684-9018-1.ch012","volume-title":"Effective cybersecurity operations for Enterprise-wide systems","author":"Gavaza","year":"2023"},{"key":"ref19","volume-title":"Human-centric security: Integrating self-determination theory into organizational security practices","author":"Gjerts\u00e5s","year":"2024"},{"key":"ref20","author":"Gooch","year":"2025"},{"key":"ref21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.47363\/JAICC\/2022(1)E118","article-title":"Human-centric cybersecurity: addressing the human element in cyber defense and ethical considerations in cybersecurity","volume":"1","author":"Gopireddy","year":"2022","journal-title":"J. Artificial Intellig. Cloud Computing"},{"key":"ref22","doi-asserted-by":"publisher","first-page":"583723","DOI":"10.3389\/fdata.2021.583723","article-title":"User, usage and usability: redefining human centric cyber security","volume":"4","author":"Grobler","year":"2021","journal-title":"Front. Big Data"},{"key":"ref23","volume-title":"User-friendly cybersecurity: A review of integrating usability and cognitive cost in SSDLC","author":"Hadi","year":"2023"},{"key":"ref24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.58471\/esaprom.v3i01.3832","article-title":"Human factors in cybersecurity: an in depth analysis of user centric studies","volume":"3","author":"Hakimi","year":"2024","journal-title":"Jurnal Ilmiah Multidisiplin Indonesia"},{"key":"ref25","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1080\/08874417.2022.2140089","article-title":"Users\u2019 adoption of national digital identity systems: human-centric cybersecurity review","volume":"63","author":"Hilowle","year":"2023","journal-title":"J. Comput. Inf. Syst."},{"key":"ref26","doi-asserted-by":"publisher","first-page":"820","DOI":"10.1080\/08874417.2023.2251452","article-title":"Improving national digital identity systems usage: human-centric cybersecurity survey","volume":"64","author":"Hilowle","year":"2024","journal-title":"J. Comput. Inf. Syst."},{"key":"ref27","author":"Hussain","year":"2017"},{"key":"ref28","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1108\/ICS-10-2023-0176","article-title":"Human-centric cyber security: applying protection motivation theory to analyse micro business owners\u2019 security behaviours","volume":"33","author":"Jamil","year":"2025","journal-title":"Inf. Comput. Secur."},{"key":"ref29","first-page":"243","author":"Jethava","year":"2025"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-60585-2_12","volume-title":"Human centric security and privacy for the IoT using formal techniques","author":"Kamm\u00fcller","year":"2018"},{"key":"ref31","first-page":"401","volume-title":"In 2017 IEEE 15th international conference on software engineering research, management and applications (SERA)","author":"Kamm\u00fcller","year":"2017"},{"key":"ref32","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1109\/PICMET.2015.7273084","article-title":"Human centric cyber security: what are the new trends in data protection?","volume":"2015","author":"Kassicieh","year":"2015","journal-title":"Portland Int. Conf. Manag. Eng. Technol."},{"key":"ref33","doi-asserted-by":"publisher","first-page":"51","DOI":"10.70619\/vol5iss12pp51-68-697","article-title":"Human-centric cybersecurity training: examining the effectiveness of human-centric approaches to cybersecurity training compared to traditional methods, focusing on behavior change","volume":"5","author":"Kelechukwu","year":"2025","journal-title":"J. Information Technol."},{"key":"ref34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-025-01032-0","article-title":"Human factors in cybersecurity: an interdisciplinary review and framework proposal","volume":"24","author":"Khadka","year":"2025","journal-title":"Int. J. Inf. Secur."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/app13063410","article-title":"The importance of Conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0","volume":"13","author":"Kioskli","year":"2023","journal-title":"Applied Sci."},{"key":"ref36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/48710620","article-title":"Conceptualising human-centric cyber security in the Arctic in light of digitalisation and climate change","volume":"11","author":"Klein","year":"2020","journal-title":"Arctic Review Law Politics"},{"key":"ref37","doi-asserted-by":"publisher","first-page":"218","DOI":"10.4236\/jis.2024.152013","article-title":"A study on the challenges of human-centric cyber-security and the guarantee of information quality","volume":"15","author":"Kurdi","year":"2024","journal-title":"J. Inf. Secur."},{"key":"ref38","volume-title":"A biometrics based user-centric authentication approach for user friendly security system","author":"Lakshmisree","year":"2016"},{"key":"ref39","volume-title":"Applied organization change in industry: Structural","author":"Leavitt","year":"1964"},{"key":"ref40","volume-title":"British engineering giant Arup revealed as 25 million deepfake scam victim","author":"Magramo","year":"2024"},{"key":"ref41","volume-title":"User-friendly security automation for Domotic networks","author":"Marino","year":"2023"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.25215\/9371838892.12","article-title":"Human-centric cybersecurity: addressing insider threats with behavior analytics","author":"Mohammed","year":"2025","journal-title":"Archiv"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.b2535","article-title":"Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement","volume":"339","author":"Moher","year":"2009","journal-title":"BMJ"},{"key":"ref44","article-title":"A brief study of wannacry threat: ransomware attack 2017","volume":"8","author":"Mohurle","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref45","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-030-50309-3_14","article-title":"A new hope: human-centric cybersecurity research embedded within organizations","author":"Morgan","year":"2020","journal-title":"International Conference on Human-Computer Interaction"},{"key":"ref46","first-page":"820","volume-title":"National Digital Identity Systems: A perspective of human-centric National Digital Identity Systems: A perspective of human-centric cybersecurity cybersecurity AUTHOR(S)","author":"Muhudin Hilowle","year":"2023"},{"key":"ref47","first-page":"1","volume-title":"2025 IEEE 5th international conference on ICT in business industry \\& government (Indore, India: ICTBIG)","author":"Narayanan","year":"2025"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1504\/ijmr.2024.10068139","article-title":"Evaluating human-centric cyber security risks in the manufacturing industry","volume":"19","author":"Ozkan Ozen","year":"2024","journal-title":"Int. J. Manuf. Res."},{"key":"ref49","author":"Paljug","year":"2020"},{"key":"ref50","doi-asserted-by":"publisher","first-page":"75945","DOI":"10.1109\/ACCESS.2021.3080329","article-title":"VAIM: verifiable anonymous identity Management for Human-Centric Security and Privacy in the internet of things","volume":"9","author":"Ra","year":"2021","journal-title":"IEEE Access"},{"key":"ref51","first-page":"1","volume-title":"Proceedings of the 12th international conference on advances in information technology","author":"Rahman","year":"2021"},{"key":"ref52","volume-title":"Human-centric cybersecurity: Safeguarding individuals in the digital age","author":"Rao","year":"2024"},{"key":"ref53","doi-asserted-by":"publisher","first-page":"138763","DOI":"10.1109\/ACCESS.2024.3467002","article-title":"Exploring secure V2X communication networks for human-centric security and privacy in smart cities","volume":"12","author":"Rishiwal","year":"2024","journal-title":"IEEE Access"},{"key":"ref54","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MCE.2021.3095385","article-title":"Humans in the loop: cybersecurity aspects in the consumer IoT context","volume":"11","author":"Rohan","year":"2021","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"ref55","author":"Rothenberg","year":"2023"},{"key":"ref56","author":"Ryan","year":"2025"},{"key":"ref57","year":"2025"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.1002\/9781119183631","volume-title":"Secrets and lies: Digital security in a networked world","author":"Schneier","year":"2015"},{"key":"ref59","article-title":"Human-centric cybersecurity research: from trapping the bad guys to helping the good ones","author":"Tabari","year":"2021"},{"key":"ref60","doi-asserted-by":"publisher","first-page":"53","DOI":"10.70470\/shifra\/2023\/007","article-title":"Human-centric cybersecurity: understanding and mitigating the role of human error in cyber incidents","volume":"2023","author":"Tambe-Jagtap","year":"2023","journal-title":"SHIFRA"},{"key":"ref61","year":"2025"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2025.3606637","article-title":"Augmenting digital ecosystem resilience through human-centric cybersecurity solutions","author":"Tari","year":"2025","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref63","doi-asserted-by":"publisher","first-page":"158","DOI":"10.4236\/jis.2025.161009","article-title":"The Cyberpsychology of small and medium-sized enterprises cybersecurity: a human-centric approach to policy development","volume":"16","author":"Troublefield","year":"2025","journal-title":"J. Inf. Secur."},{"key":"ref64","doi-asserted-by":"publisher","first-page":"8","DOI":"10.54941\/ahfe1005596","article-title":"Human-centric security engineering: towards a research agenda","volume":"159","author":"van der Kleij","year":"2024","journal-title":"Hum. Factors Des. Eng. Comput"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1109\/ICEDCS64328.2024.00205","volume-title":"2024 international conference on electronics and devices, computational science (ICEDCS)","author":"Wang","year":"2024"},{"key":"ref66","first-page":"1","article-title":"Build a human-centric maritime transportation cybersecurity protection system based on MARITIME","volume":"1","author":"Zhou","year":"2025","journal-title":"International Journal of Advanced AI Applications"}],"container-title":["Frontiers in Computer Science"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2026.1764808\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:54:22Z","timestamp":1772106862000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fcomp.2026.1764808\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,26]]},"references-count":66,"alternative-id":["10.3389\/fcomp.2026.1764808"],"URL":"https:\/\/doi.org\/10.3389\/fcomp.2026.1764808","relation":{},"ISSN":["2624-9898"],"issn-type":[{"value":"2624-9898","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,26]]},"article-number":"1764808"}}