References: [1] Shepherd, L. A., Archibald, J., Ferguson, R. I. (2013). Perception of risky security behaviour by users: Survey of current approaches. In Human Aspects of Information Security, Privacy, and Trust: First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings 1 (pp. 176-185). Springer.
[2] Pfleeger, S. L., Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & Security, 31, 597-611.
[3] Cohen, S., Nutt, W., Sagiv, Y. (2007). Deciding equivalences among conjunctive aggregate queries. Journal of the ACM (JACM), 54, 5-es.
[4] Stanton, J. M., Stam, K. R., Mastrangelo, P., Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24, 124-133.
[5] Carnavalet, X. D. C. D., Mannan, M. (2015). A large-scale evaluation of high-impact password strength meters. ACM Transactions on Information and System Security (TISSEC), 18, 1-32.
[6] Scholefield, S., Shepherd, L. A. (2019). Gamification techniques for raising cyber security awareness. In HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings 21 (pp. 191-203). Springer.
[7] Fink, G., Best, D., Manz, D., Popovsky, V., Endicott-Popovsky, B. (2013). Gamification for measuring cyber security situational awareness. In Foundations of Augmented Cognition: 7th International Conference, AC 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings 7 (pp. 656-665). Springer.
[8] Rieff, I. (2018). Systematically applying gamification to cyber security awareness trainings. |