Abstract
Cyberpsychology, Behavior, and Social NetworkingVol. 17, No. 3 EditorialThe Role of Psychology in Enhancing CybersecurityBrenda K. WiederholdBrenda K. WiederholdSearch for more papers by this authorPublished Online:4 Mar 2014https://doi.org/10.1089/cyber.2014.1502AboutSectionsView articleView Full TextPDF/EPUB ToolsPermissionsDownload CitationsTrack CitationsAdd to favorites Back To Publication ShareShare onFacebookTwitterLinked InRedditEmail View article"The Role of Psychology in Enhancing Cybersecurity." Cyberpsychology, Behavior, and Social Networking, 17(3), pp. 131–132FiguresReferencesRelatedDetailsCited byModeling effective cybersecurity training frameworks: A delphi method-based studyComputers & Security, Vol. 113Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyCyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyAutomation Error Type and Methods of Communicating Automation Reliability Affect Trust and Performance: An Empirical Study in the Cyber DomainIEEE Transactions on Human-Machine Systems, Vol. 51, No. 5Attention Deficit Hyperactivity Symptoms, Impulsivity, and Cyberdeviance in an Adult Population8 March 2021 | Journal of Psychopathology and Behavioral Assessment, Vol. 43, No. 3Increasing Cybersecurity Through Emotional Engagement Brenda K. Wiederhold15 September 2021 | Cyberpsychology, Behavior, and Social Networking, Vol. 24, No. 9Mathematical Modeling of Information Warfare - Status, Challenges and Future TrendsThe Role of User Behaviour in Improving Cyber Security Management18 June 2021 | Frontiers in Psychology, Vol. 12How Do Undergraduate Students Construct Their View of Cybercrime? Exploring Definitions of Cybercrime, Perceptions of Online Risk and Victimization26 December 2018 | Policing: A Journal of Policy and Practice, Vol. 15, No. 1What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors16 April 2021 | Human Factors: The Journal of the Human Factors and Ergonomics Society, Vol. 1Risk and Protective Factors for Intuitive and Rational Judgment of Cybersecurity Risks in a Large Sample of K-12 Students and TeachersComputers in Human Behavior, Vol. 347Understanding the Last Line of Defense: Human Response to Cybersecurity Events3 July 2021Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?1 July 2020 | Criminal Justice Review, Vol. 45, No. 4In Defence of the Human Factor10 July 2020 | Frontiers in Psychology, Vol. 11Wishing to be like the character on screen: Media exposure and perception of hacking behavior21 February 2020 | Cyberpsychology: Journal of Psychosocial Research on Cyberspace, Vol. 14, No. 1Factors Related to Cyber Security BehaviorIEEE Access, Vol. 8Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research3 May 2019 | Frontiers in Psychology, Vol. 10Cybersecurity for Android Applications: Permissions in Android 5 and 610 July 2018 | International Journal of Human–Computer Interaction, Vol. 35, No. 7Cyber Attacks, Contributing Factors, and Tackling StrategiesThe Cyber AcumenTheoretical Domain Framework to Identify Cybersecurity Behaviour Constructs18 November 2019Cyber Security Competency Model Based on Learning Theories and Learning Continuum HierarchyA Three-Vector Approach to Blind Spots in CybersecurityCyber Attacks, Contributing Factors, and Tackling StrategiesCyber Security Patterns Students Behavior and Their Participation in Loyalty ProgramsCyber Attacks, Contributing Factors, and Tackling StrategiesCyber Security Patterns Students Behavior and Their Participation in Loyalty ProgramsInsider Attack Analysis in Building Effective Cyber Security for an OrganizationInfluence of privacy priming and security framing on mobile app selectionComputers & Security, Vol. 78Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?Computers in Human Behavior, Vol. 84The Looming Cybersecurity Crisis and What It Means for the Practice of Industrial and Organizational Psychology19 June 2018 | Industrial and Organizational Psychology, Vol. 11, No. 2Cyber Security Patterns Students Behavior and Their Participation in Loyalty ProgramsInternational Journal of Ambient Computing and Intelligence, Vol. 9, No. 2Risk Factors for Social Networking Site Scam Victimization Among Malaysian Students Gráinne H. Kirwan, Chris Fullwood, and Brendan Rooney1 February 2018 | Cyberpsychology, Behavior, and Social Networking, Vol. 21, No. 2Human Factors Leading to Online Fraud VictimisationInsider Attack Analysis in Building Effective Cyber Security for an OrganizationA Three-Vector Approach to Blind Spots in CybersecurityCyber Attacks, Contributing Factors, and Tackling StrategiesInternational Journal of Cyber Behavior, Psychology and Learning, Vol. 7, No. 4Analysis of Cyber-security Benefits on Cyberspace in Nigerian Insurance Companies10 January 2018 | Journal of Communication, Vol. 8, No. 2The Role of Human Factors/Ergonomics in the Science of Security20 May 2015 | Human Factors: The Journal of the Human Factors and Ergonomics Society, Vol. 57, No. 5Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords13 January 2015 | Cyberpsychology, Behavior, and Social Networking, Vol. 18, No. 1 Volume 17Issue 3Mar 2014 InformationCopyright 2014, Mary Ann Liebert, Inc.To cite this article:Brenda K. Wiederhold.The Role of Psychology in Enhancing Cybersecurity.Cyberpsychology, Behavior, and Social Networking.Mar 2014.131-132.http://doi.org/10.1089/cyber.2014.1502Published in Volume: 17 Issue 3: March 4, 2014PDF download
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.