Publisher
Springer Nature Switzerland
Reference63 articles.
1. Huang, K., Wang, X., Wei, W., Madnick, S.: The Devastating Business Impacts of a Cyber Breach. https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach
2. Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581–590 (2006)
3. Prümmer, J., van Steen, T., van den Berg, B.: A systematic review of current cybersecurity training methods. Comput. Secur. 136, 103585 (2024). https://doi.org/10.1016/j.cose.2023.103585
4. van Steen, T., Deeleman, J.R.A.: Successful gamification of cybersecurity training. Cyberpsychology Behav. Soc. Netw. (2021). https://doi.org/10.1089/cyber.2020.0526
5. Adinolf, S., Wyeth, P., Brown, R., Altizer, R.: Towards designing agent based virtual reality applications for cybersecurity training. In: Proceedings of the 31st Australian Conference on Human-Computer-Interaction, pp. 452–456. Association for Computing Machinery (2019)