UsefulLinks
Computer Science
Cybersecurity
Human-Centric Cybersecurity
1. Introduction to Human-Centric Cybersecurity
2. Human Psychology and Cybersecurity
3. Human Error in Cybersecurity
4. Behavioral Science Applications
5. Social Engineering Attacks
6. Usable Security Design
7. Security Training and Awareness
8. Security Culture Development
9. Measurement and Metrics
10. Advanced Topics and Emerging Trends
8.
Security Culture Development
8.1.
Understanding Security Culture
8.1.1.
Culture Definition and Components
8.1.2.
Shared Values and Beliefs
8.1.3.
Behavioral Norms
8.1.4.
Cultural Artifacts
8.1.5.
Subcultures and Variations
8.2.
Culture Assessment Methods
8.2.1.
Culture Surveys and Questionnaires
8.2.2.
Focus Groups and Interviews
8.2.3.
Behavioral Observation
8.2.4.
Incident Analysis
8.2.5.
Cultural Maturity Models
8.3.
Leadership and Culture
8.3.1.
Executive Sponsorship
8.3.2.
Tone at the Top
8.3.3.
Middle Management Role
8.3.4.
Leadership Communication
8.3.5.
Modeling Behaviors
8.4.
Security Champions Programs
8.4.1.
Champion Selection Criteria
8.4.2.
Program Structure and Governance
8.4.3.
Training and Development
8.4.4.
Activities and Responsibilities
8.4.5.
Recognition and Rewards
8.4.6.
Program Sustainability
8.5.
Communication Strategies
8.5.1.
Message Development
8.5.2.
Channel Selection
8.5.3.
Frequency and Timing
8.5.4.
Storytelling Techniques
8.5.5.
Visual Communication
8.5.6.
Two-Way Communication
8.6.
Culture Change Management
8.6.1.
Change Models and Frameworks
8.6.2.
Resistance Management
8.6.3.
Stakeholder Engagement
8.6.4.
Implementation Planning
8.6.5.
Monitoring and Adjustment
8.7.
Organizational Integration
8.7.1.
Policy and Procedure Alignment
8.7.2.
Performance Management Integration
8.7.3.
Hiring and Onboarding
8.7.4.
Career Development
8.7.5.
Organizational Structure
Previous
7. Security Training and Awareness
Go to top
Next
9. Measurement and Metrics