Human-Centric Cybersecurity
Information Processing Models
Attention and Perception in Security
Memory Systems and Security Knowledge
Decision-Making Processes
Cognitive Load Theory
Anchoring Bias
Confirmation Bias
Availability Heuristic
Optimism Bias
Authority Bias
Overconfidence Effect
Hindsight Bias
Framing Effects
User Perceptions of Threats
Security Misconceptions and Gaps
Risk Assessment Mental Models
Technology Understanding Limitations
Security Metaphors and Analogies
Risk Perception and Assessment
Time Pressure Effects
Stress and Decision Quality
Heuristics and Shortcuts
Probability Estimation Errors
Loss Aversion in Security Decisions
Present Bias and Future Discounting
Endowment Effect
Status Quo Bias
Social Preferences and Security
Previous
1. Introduction to Human-Centric Cybersecurity
Go to top
Next
3. Human Error in Cybersecurity