Human-Centric Cybersecurity
Intrinsic Motivation Factors
Extrinsic Motivation Systems
Self-Determination Theory
Goal Setting Theory
Expectancy Theory
Habit Loop Components
Building Positive Security Habits
Breaking Risky Behaviors
Environmental Cues and Triggers
Habit Stacking Techniques
Social Proof Mechanisms
Peer Influence Effects
Group Conformity Pressures
Social Identity and Security
Descriptive vs Injunctive Norms
Choice Architecture Principles
Default Options Design
Feedback and Visibility
Timing and Context
Examples of Security Nudges
Transtheoretical Model
Theory of Planned Behavior
Health Belief Model
Social Cognitive Theory
Implementation Intentions
Previous
3. Human Error in Cybersecurity
Go to top
Next
5. Social Engineering Attacks