UsefulLinks
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
  1. Computer Science
  2. Cybersecurity

Human-Centric Cybersecurity

1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
4.
Behavioral Science Applications
4.1.
Motivation and Security Behavior
4.1.1.
Intrinsic Motivation Factors
4.1.2.
Extrinsic Motivation Systems
4.1.3.
Self-Determination Theory
4.1.4.
Goal Setting Theory
4.1.5.
Expectancy Theory
4.2.
Habit Formation and Change
4.2.1.
Habit Loop Components
4.2.2.
Building Positive Security Habits
4.2.3.
Breaking Risky Behaviors
4.2.4.
Environmental Cues and Triggers
4.2.5.
Habit Stacking Techniques
4.3.
Social Influence and Norms
4.3.1.
Social Proof Mechanisms
4.3.2.
Peer Influence Effects
4.3.3.
Group Conformity Pressures
4.3.4.
Social Identity and Security
4.3.5.
Descriptive vs Injunctive Norms
4.4.
Nudge Theory in Security
4.4.1.
Choice Architecture Principles
4.4.2.
Default Options Design
4.4.3.
Feedback and Visibility
4.4.4.
Timing and Context
4.4.5.
Examples of Security Nudges
4.5.
Behavior Change Models
4.5.1.
Transtheoretical Model
4.5.2.
Theory of Planned Behavior
4.5.3.
Health Belief Model
4.5.4.
Social Cognitive Theory
4.5.5.
Implementation Intentions

Previous

3. Human Error in Cybersecurity

Go to top

Next

5. Social Engineering Attacks

About•Terms of Service•Privacy Policy•
Bluesky•X.com

© 2025 UsefulLinks. All rights reserved.