Useful Links
Computer Science
Cybersecurity
Human-Centric Cybersecurity
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
Usable Security Design
Principles of Usable Security
Security-Usability Trade-offs
Principle of Least Effort
Reducing Security Friction
Workflow Integration
Mental Model Alignment
User-Centered Security Design Process
User Research Methods
Interviews and Surveys
Observational Studies
Persona Development
Journey Mapping
Security Requirements Analysis
Threat Modeling from User Perspective
Risk Assessment Integration
Compliance Requirements
Design and Prototyping
Iterative Design Process
Low-Fidelity Prototyping
High-Fidelity Prototyping
Design System Development
Usability Testing
Testing Methods
Metrics and Evaluation
Accessibility Testing
Security-Specific Testing
Authentication and Access Control
Password Management
Password Creation Guidelines
Password Managers
Password Recovery
Multi-Factor Authentication
Factor Types and Selection
User Experience Design
Backup and Recovery
Passwordless Authentication
Biometric Authentication
Hardware Tokens
Mobile-Based Authentication
Single Sign-On Systems
User Experience Considerations
Security Implications
Security Warnings and Notifications
Warning Design Principles
Attention and Comprehension
Warning Fatigue Prevention
Actionable Guidance
Contextual Warnings
Privacy-Enhancing Design
Privacy by Design Principles
Data Minimization
User Control and Transparency
Consent Mechanisms
Privacy Dashboards
Common Design Anti-Patterns
Security Theater
Excessive Warnings
Complex Security Controls
Poor Error Messages
Inconsistent Interfaces
Previous
5. Social Engineering Attacks
Go to top
Next
7. Security Training and Awareness