Useful Links
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
  1. Computer Science
  2. Cybersecurity

Human-Centric Cybersecurity

1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
  1. Behavioral Science Applications
    1. Motivation and Security Behavior
      1. Intrinsic Motivation Factors
        1. Extrinsic Motivation Systems
          1. Self-Determination Theory
            1. Goal Setting Theory
              1. Expectancy Theory
              2. Habit Formation and Change
                1. Habit Loop Components
                  1. Building Positive Security Habits
                    1. Breaking Risky Behaviors
                      1. Environmental Cues and Triggers
                        1. Habit Stacking Techniques
                        2. Social Influence and Norms
                          1. Social Proof Mechanisms
                            1. Peer Influence Effects
                              1. Group Conformity Pressures
                                1. Social Identity and Security
                                  1. Descriptive vs Injunctive Norms
                                  2. Nudge Theory in Security
                                    1. Choice Architecture Principles
                                      1. Default Options Design
                                        1. Feedback and Visibility
                                          1. Timing and Context
                                            1. Examples of Security Nudges
                                            2. Behavior Change Models
                                              1. Transtheoretical Model
                                                1. Theory of Planned Behavior
                                                  1. Health Belief Model
                                                    1. Social Cognitive Theory
                                                      1. Implementation Intentions

                                                    Previous

                                                    3. Human Error in Cybersecurity

                                                    Go to top

                                                    Next

                                                    5. Social Engineering Attacks

                                                    © 2025 Useful Links. All rights reserved.

                                                    About•Bluesky•X.com