UsefulLinks
Computer Science
Cybersecurity
Human-Centric Cybersecurity
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
4.
Behavioral Science Applications
4.1.
Motivation and Security Behavior
4.1.1.
Intrinsic Motivation Factors
4.1.2.
Extrinsic Motivation Systems
4.1.3.
Self-Determination Theory
4.1.4.
Goal Setting Theory
4.1.5.
Expectancy Theory
4.2.
Habit Formation and Change
4.2.1.
Habit Loop Components
4.2.2.
Building Positive Security Habits
4.2.3.
Breaking Risky Behaviors
4.2.4.
Environmental Cues and Triggers
4.2.5.
Habit Stacking Techniques
4.3.
Social Influence and Norms
4.3.1.
Social Proof Mechanisms
4.3.2.
Peer Influence Effects
4.3.3.
Group Conformity Pressures
4.3.4.
Social Identity and Security
4.3.5.
Descriptive vs Injunctive Norms
4.4.
Nudge Theory in Security
4.4.1.
Choice Architecture Principles
4.4.2.
Default Options Design
4.4.3.
Feedback and Visibility
4.4.4.
Timing and Context
4.4.5.
Examples of Security Nudges
4.5.
Behavior Change Models
4.5.1.
Transtheoretical Model
4.5.2.
Theory of Planned Behavior
4.5.3.
Health Belief Model
4.5.4.
Social Cognitive Theory
4.5.5.
Implementation Intentions
Previous
3. Human Error in Cybersecurity
Go to top
Next
5. Social Engineering Attacks