Useful Links
Computer Science
Cybersecurity
Human-Centric Cybersecurity
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
Behavioral Science Applications
Motivation and Security Behavior
Intrinsic Motivation Factors
Extrinsic Motivation Systems
Self-Determination Theory
Goal Setting Theory
Expectancy Theory
Habit Formation and Change
Habit Loop Components
Building Positive Security Habits
Breaking Risky Behaviors
Environmental Cues and Triggers
Habit Stacking Techniques
Social Influence and Norms
Social Proof Mechanisms
Peer Influence Effects
Group Conformity Pressures
Social Identity and Security
Descriptive vs Injunctive Norms
Nudge Theory in Security
Choice Architecture Principles
Default Options Design
Feedback and Visibility
Timing and Context
Examples of Security Nudges
Behavior Change Models
Transtheoretical Model
Theory of Planned Behavior
Health Belief Model
Social Cognitive Theory
Implementation Intentions
Previous
3. Human Error in Cybersecurity
Go to top
Next
5. Social Engineering Attacks