<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Diving Deep into Human Centric Issues within Cyber Security</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Kalpit</forename><surname>Jadhav</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">The University of Adelaide</orgName>
								<address>
									<settlement>Adelaide</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Sherif</forename><surname>Haggag</surname></persName>
							<email>sherif.haggag@adelaide.edu.au</email>
							<affiliation key="aff1">
								<orgName type="institution">The University of Adelaide</orgName>
								<address>
									<settlement>Adelaide</settlement>
									<country key="AU">Australia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hussein</forename><surname>Haggag</surname></persName>
							<email>hussein.haggag@umu.se</email>
							<affiliation key="aff2">
								<orgName type="institution">Umeå University</orgName>
								<address>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Diving Deep into Human Centric Issues within Cyber Security</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">481CC75C911627E6EF949D2A27B45FF2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:40+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>cyber security, human factors, social engineering, framework (H. Haggag) 0000-0002-XXXX-XXXX (K. Jadhav)</term>
					<term>0000-0001-XXXX-XXXX (S. Haggag)</term>
					<term>0000-0002-XXXX-XXXX (H. Haggag)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Computer security is more than just about the technological systems; it also relates to the people that use the systems and how their different behaviours may be exploited. Organizations are prone to security breaches, which sometimes are caused by human error. As a result, organizations should seek to improve their employees' knowledge about cyber security and their capability to engage in secure cyber behaviours. It is possible to target groups ranging from basic users who need some basic understanding of the current threat environment and how to utilize the associated preventive mechanisms, to security experts who need practical exposure in responding to security incidents. Risk-taking preferences, decision-making styles, demographics, and personality characteristics, such as gender, age, culture and emotions, have been found to significantly affect the predictive ability of good security behavior. How gender and age mediate the influences on cyber security beliefs and behaviours among employees is quite interesting. Using behavioural cyber security and human factors to provide insight into relevant theories and principles, this paper proposes an interdisciplinary framework that combines these disciplines.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Humans play an important role in security measures, thus research on security-related decisions and actions based on human "information-processing and decisionmaking principles" is necessary <ref type="bibr" target="#b0">[1]</ref>. Cyber security's "human factors" are concerned with the role that human behaviour plays in preventing and responding to cyberattacks <ref type="bibr" target="#b1">[2]</ref>. Additionally to cyberattacks aimed at targeting network infrastructures, a variant of cyberattack, designed specifically to exploit the vulnerabilities of individuals; these are social engineering attacks <ref type="bibr" target="#b1">[2]</ref>. Social engineering aims to obtain illegal access to sensitive and confidential information by manipulating individuals' psychological states <ref type="bibr" target="#b2">[3]</ref>. Because employees can contribute to protect the interests of organizations in the face of social engineered attacks, organizations find the need to implement information security awareness programs to secure their data <ref type="bibr" target="#b2">[3]</ref>. Understanding the security behaviour of both men and women, and whether their security behaviours are similar or different, is es-CEUR Workshop Proceedings (CEUR-WS.org) sential to developing effective cyber security programs for the workplace <ref type="bibr" target="#b3">[4]</ref>. In addition to training materials, policies and frameworks, information about preventive measures to be followed before and after an attack must also be undertaken.</p><p>The age, gender, or cultural background may make a person more susceptible to some malicious act <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. Researchers have found that women are more likely to fall victim to phishing scams than men, and so are people between 18 to 25 years of age <ref type="bibr" target="#b6">[7]</ref>. In order to combat such limitations and biases, companies should establish clear security guidelines and educate their employees about them. Organizations can achieve satisfying results in response to social engineering attacks by improving their information security frameworks including the training and awareness programs.</p><p>In this research we aim to address the two key research questions:</p><p>RQ1 -What factors that influence human susceptibility to cybercrime and social engineering attacks are reported in the peer reviewed literature? Individuals are more susceptible to social engineering attacks for a variety of reasons. In general, social engineering attempts appear more effective if the attacker is able to establish trust with the victim, putting them at greater risk <ref type="bibr" target="#b7">[8]</ref>. Individual factors or personality traits can also increase the likelihood of someone falling victim to social engineering attacks. It is possible to increase the effectiveness of phishing emails and illegitimate websites by using a number of strategies. In this research, we highlight the various human factors that can make an individual more susceptible to attack as reported in the academic literature.</p><p>RQ2 -Why do we need a personalised cyber security framework for training employees within an organisation? Personalized cyber security frameworks will enhance the existing security protocols and methodologies followed during training and will incorporate new security layers which will consider even the human factors that impact an individual's cyber behaviour and awareness. Section 2 of this research highlights the aims and challenges that this paper intends to overcome. Section 3 presents literature review studied from different research papers in order to formulate results. The design and plan followed in this research has been presented in section 4. The results identified and formulated have been explained and tabulated in section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Aims and challenges</head><p>Training and awareness programs present several challenges such as "business environmental, social, constitutional, organizational, economical, and personal". 'Trusting nature of humans' is another factor that hinders awareness and training programs against social engineering is a low level of interest found within the personnel. Moreover, problem with modern training techniques is that they take a lot of time and even lack training budget <ref type="bibr" target="#b2">[3]</ref>.</p><p>The absence of cybercrime, which is instrumental in exploiting both the vulnerabilities of systems and human weaknesses, is one of the biggest obstacles to implementing digital transformation strategies. Employees must be provided with the proper training in order for them to be able to recognize, flag, evade, and disable malicious attacks <ref type="bibr" target="#b2">[3]</ref>. To upgrade the cyber security training programmes more human centric, an awareness or training framework must be implemented for all personnel, which include the major cyber risk aspects and its awareness factors <ref type="bibr" target="#b4">[5]</ref>.</p><p>There is a need to investigate the similarities and differences between men and women with regard to cyber security beliefs and behaviours like personality, cultural background, emotion reaction, age, and motivation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Literature review</head><p>Hatzivasilis et al. in <ref type="bibr" target="#b4">[5]</ref>, describe a methodology to adapt cyber security training programmes dynamically. They mention how a trainee consumes the primary teaching materials such as lectures, tutorials, videos, etc. and goes on to more advanced learning methods which involve multiple hands-on exercises on emulated/simulated components <ref type="bibr" target="#b4">[5]</ref>. The performance is evaluated and a preliminary application is presented, where a training programme for smart shipping personnel is established <ref type="bibr" target="#b4">[5]</ref>.</p><p>Factors that may help overcome the difficulties posed by implementing a training and awareness program against social engineering are studied in research by Aldawood and Skinner <ref type="bibr" target="#b2">[3]</ref>. The authors describe the need of information security training and awareness programs is to harness employees with skills to identify, disable, and report any social engineering attempts to misuse their resources. The study also makes recommendations based on the viewpoint of security decision makers within organizations on how to address challenges <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>Key issues faced by cyber security training and awareness programs have been identified in research by Korpela <ref type="bibr" target="#b6">[7]</ref> and the probable benefits that can be derived by combining existing data sources to enhance these programs using learning analytics which is an upcoming field in data analytics has been explained. The author even mentions that in order to potentially improve cyber security metrics, organizations and professionals should harness the use of data analytics to tackle the issues of how users fail to identify risks and a 'lack of understanding on how cyber security is best learned by its users <ref type="bibr" target="#b6">[7]</ref>.</p><p>Importance of putting in place formal educational and training standards to enable organisations to manage human factors related to cyber security effectively has been highlighted in the research of Nifakos et al <ref type="bibr" target="#b1">[2]</ref>, ultimately reducing cyber risks. The research examined human factors, but a systematic methodology for harmonising the research findings should be developed to allow cyber security experts to objectively evaluate these findings in order to support securing the IT infrastructure of healthcare facilities in future research <ref type="bibr" target="#b1">[2]</ref>.</p><p>How an interdisciplinary approach based on a human factors approach can contribute to the science of security has been conveyed in the research of Proctor and Chen <ref type="bibr" target="#b0">[1]</ref>. The authors describe the importance of human factors in security by using two examples that illustrate the contribution of a scientific approach to security detection of phishing attacks and the selection of mobile applications <ref type="bibr" target="#b0">[1]</ref>. Finally, they conclude that in order to contribute to cyber security, human factors experts should utilize their existing knowledge of applied information processing and decision making <ref type="bibr" target="#b0">[1]</ref>.</p><p>Methods for measuring, quantifying, and evaluating human organizations' security posture, especially those within large corporations and government organizations have been investigated by Brian et al in their research <ref type="bibr" target="#b12">[13]</ref>. The study presents the results of two rounds of experiments conducted at Columbia University using bo-gus phishing emails to train approximately 4000 staff and students <ref type="bibr" target="#b12">[13]</ref>. The authors further suggest that it is possible to train users using decoy technology to anticipate possible threats, and the measurements can be applied to multiple organizations in order to gauge their security posture as compared to each other <ref type="bibr" target="#b12">[13]</ref>.</p><p>Correlation of human characteristics with cyber security behaviour intentions has been researched by Gratian et al <ref type="bibr" target="#b13">[14]</ref>. The study estimated that 5 to 23 percent of the variance in the reported cyber security behaviour intentions was attributable to individual differences based on demographic factors, personality traits, risk-taking preferences, and decision-making styles in 369 students, faculty, and staff at a large public university <ref type="bibr" target="#b13">[14]</ref>.</p><p>The purpose of study by Anwar et al. <ref type="bibr" target="#b3">[4]</ref> was to investigate the effect of gender as a deciding variable in the relationship among the psychosocial factors and selfreported cyber security behaviours among staff of diverse organizations. The results of this study indicate statistically significant differences between men and women in terms of computer skills, prior experience, cues-to-action, and security self-efficacy. Self-efficacy among women is significantly lower than that among men, so they could be possibly targeted for intervention <ref type="bibr" target="#b3">[4]</ref>. Thus, they conclude that by addressing the relevant constructs of the cyber security behaviour, we can develop gender-specific cyber security training and interventions to improve employees' attitudes and behaviour <ref type="bibr" target="#b3">[4]</ref>.</p><p>Human factor is one of the major contributors to the vulnerabilities of an information system, and disparate attack vectors which are being utilized today to exploit human weaknesses have been examined in research by Radu et al <ref type="bibr" target="#b14">[15]</ref>. The authors further state that a social engineering awareness and training program must ensure that employees have a basic understanding of how social engineering attacks are conducted <ref type="bibr" target="#b14">[15]</ref>. Furthermore, employees must have the knowledge and training necessary to detect an attack, respond appropriately, and find a way to prevent exposure to social engineering threats <ref type="bibr" target="#b14">[15]</ref>.</p><p>Review of relevant theories and principles which provide insight through an interdisciplinary framework that encompasses human factors, behavioural cyber security, and modelling and simulation has been carried out Maalem et al <ref type="bibr" target="#b15">[16]</ref>. The authors mention that it is important to customize cyber awareness training to employees considering their different credentials and levels of access. They further state that employees need to be trusted, but they must also be taught technology and cyber awareness, and compliance needs to be verified <ref type="bibr" target="#b15">[16]</ref>.</p><p>An extensive financial institution in Thailand conducted study in research by Daengsi et al. <ref type="bibr" target="#b16">[17]</ref> to assess cyber security awareness among approximately 20,000 employees. An initial phishing attack was conducted where knowledge transfer was achieved and followed by a second phishing attack that had different content <ref type="bibr" target="#b16">[17]</ref>. According to the results of the study, gender plays a significant role in cyber security awareness within the Thai cyber ecosystem since Thai female employees have a higher level of cyber security awareness than male employees as well as the differences between the ages of Thai users' cyber security awareness <ref type="bibr" target="#b16">[17]</ref>. Although this research is just limited to Thai employees but can be considered in general sense too.</p><p>By identifying effective ways to encourage cyber security education development and address gender gaps in the cyber security workforce, the overall goal in study by Amo et al. <ref type="bibr" target="#b17">[18]</ref> is to contribute to the literature on cyber security education. Their findings indicate that female students were significantly more engaged and efficacious in cyber security, which is quite promising in regards to gender gaps in cyber security <ref type="bibr" target="#b17">[18]</ref>.</p><p>The study by Gillam and Waite <ref type="bibr" target="#b18">[19]</ref> sought to identify the psychological factors that influence workplace IT end users' motivation to learn about cyber awareness and avoid threats. As a result of this study, gender-related considerations were revealed that can be used to guide cyber security training of IT end-users such as threat avoidance in human resource development contexts, especially when it comes to motivation <ref type="bibr" target="#b18">[19]</ref>.</p><p>Study of 'Gender and locale differences in cybercrime awareness among adolescents' was conducted by Thakur and Kaur <ref type="bibr" target="#b19">[20]</ref>. The findings showed that there were significant gender differences between rural and urban young males and young females in terms of cybercrime awareness.</p><p>By bringing together research from unique and diverse disciplinary backgrounds, study by Jeong et al. <ref type="bibr" target="#b20">[21]</ref> enables us to increase our understanding and provide a framework for effective cyber security strategies by providing a comprehensive overview of the socio-cultural dimensions of cyber security. This special issue addresses people, culture, and cyber security research that enriches our understanding of them. Following the expert review process, a framework and assessment tool were developed to highlight strengths, weaknesses, and opportunities <ref type="bibr" target="#b20">[21]</ref>.</p><p>The analysis in research by Creese <ref type="bibr" target="#b21">[22]</ref> identifies that on the basis of their development and the extent of their Internet use, some countries have demonstrated greater maturity in capacity building than were expected. Through a cross-national and cross-regional comparison of capacity building, this paper shows regional differences are largely influenced by two key national differences in the extent of Internet use and the level of development <ref type="bibr" target="#b21">[22]</ref>.</p><p>A three-part study of people's perceptions of cyber security is presented by Renaud et al <ref type="bibr" target="#b22">[23]</ref>. Several aspects of people's lived cyber security experiences were confirmed by the investigation where one blind spot issue was identified along with negative attitude of people toward cyber security that are widespread but not universal is studied <ref type="bibr" target="#b22">[23]</ref>.</p><p>Using open-ended responses from a pilot study and congressional debates, research by Cheung-Blunden et al. <ref type="bibr" target="#b23">[24]</ref> sought to identify behavioral categories in cyber security solutions. By distinguishing fear, three types of safety behaviors which are avoidance, surveillance and vigilance were identified in this study and were expected to be mutually exclusive because emotion was expected to have unique motivational power <ref type="bibr" target="#b23">[24]</ref>.</p><p>A hacking of one's smart security camera represents one of the most emblematic examples of a cyber security breach, and study by Budimir et al. <ref type="bibr" target="#b24">[25]</ref> explored which personality characteristics systematically relate to these processes. An important link between a cyber security breach situation and possible long-term mental health effects was discovered in this study <ref type="bibr" target="#b24">[25]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Research plan and Methodology</head><p>The research implementation is carried out in two phases. The first phase is about carrying out an in depth analysis and researching into the topic of human centric issues of cyber security. It involves referring of research papers and articles through the use of university library and other platforms. Investigation on the importance of human centric aspects in cyber security, how to build apps and training materials applicable with personality, gender, cultural background, emotion reaction, age, motivation, and hidden biases is carried out. The second phase involves development of a framework which includes the above-mentioned aspects and to provide guidelines as to how the framework can be useful for organizations for carrying out cyber trainings and awareness programmes.</p><p>A secondary research methodology is employed in this research, since this study relies on already existing data. Various sources such as published journals and reports in the University library and websites are used for the collection, organization, and analysis of data.</p><p>The figure <ref type="figure" target="#fig_0">1</ref> shows that existing cyber training and awareness programs are modified by adding the different human factors which have been mentioned in the paper. This helps to develop a personalised cyber training framework. The framework developed and evaluated would be used to train an individual exhibiting specific human centeric factors to build their cyber awareness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Results</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Gender:</head><p>Study has been conducted for cyber risk assessment where as a part of the test, a phishing email offering more Gmail storage was sent by the experts <ref type="bibr" target="#b16">[17]</ref>. The data from this test was gathered, processed, and analysed and found that female employees' responses were always lower than those of male employees <ref type="bibr" target="#b16">[17]</ref>. It indicates that females have a better level of cyber security awareness of phishing than males <ref type="bibr" target="#b16">[17]</ref>. A positive growth pattern in cyber security self-efficacy is observed in females compared to males and females gained more problem-solving proficiency than males over time <ref type="bibr" target="#b17">[18]</ref>. While young females have higher mean values than young males in cases where there is a high level of cybercrime awareness, they are ahead in cases of medium levels, and in cases where there is a low level of cybercrime awareness, young females tend to have higher mean values than young males <ref type="bibr" target="#b19">[20]</ref>.</p><p>Males tend to react more aggressively to cyberbullying and have a deeper emotional response in situations of hacking, while females tend to have more intense emotional reactions. Using digital technologies, cyberbullying involves repeated behavior meant to intimidate, anger, or shame the target <ref type="bibr" target="#b25">[26]</ref>. Mobile phones, messaging platforms, gaming platforms, and social media platforms can all be used for this <ref type="bibr" target="#b25">[26]</ref>. 'Remote sexual abuse' occurs more often against women and girls than men -coerced to pose naked online or stalked via internet <ref type="bibr" target="#b26">[27]</ref>. The term cyberstalking means stalking someone through the use of the internet. Stalkers are using email message applications, posting messages on the web, and sometimes even social media, such as Facebook, Instagram, and many more, to continually try to approach someone online without their consent <ref type="bibr" target="#b26">[27]</ref>.</p><p>Based on the observations and results of the studies that have been referred to for this research, the Table <ref type="table" target="#tab_0">1</ref> shows the things that need to be considered for cyber training specific to an individual's gender.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Age:</head><p>A person's age can also be considered a crucial factor when determining a person's identity, since people at  <ref type="bibr" target="#b16">[17]</ref>. Self-efficacy and precautionary behavior were significantly positively correlated with self-efficacy in youngsters, but in older group the correlation was negatively significant, but not statistically significant <ref type="bibr" target="#b18">[19]</ref>.</p><p>Adolescents are most at risk for Cybercrime due to their attraction to the internet <ref type="bibr" target="#b19">[20]</ref>. Therefore, adolescents are very much in need of awareness/knowledge related to cybercrime, since failure to do so can harm them financially or emotionally <ref type="bibr" target="#b19">[20]</ref>. The teenager is already seeking the truth only through his own experiences, if the child is ready to obey the authority of an adult, this is the age of active knowledge and personal development <ref type="bibr" target="#b27">[28]</ref>. Teenagers often commit acts that can lead to undesirable consequences for the simple reason that they try to protect themselves from adults' influence, and they are easy targets for criminals because of their curiosity, openness, and lack of experience <ref type="bibr" target="#b27">[28]</ref>.</p><p>People between 18 and 25 years old are more vulnerable to phishing scams <ref type="bibr" target="#b6">[7]</ref>. Every day, college students use the internet for work and pleasure -to complete research for essays and assignments, to stay connected on social media, to make online purchases, and to keep up-to-date on entertainment news <ref type="bibr" target="#b28">[29]</ref>. In the age of cybercrime, the sheer amount of data we share online puts us all at risk. It is more likely that young people and college students will fall for fraud scams as they use social media at higher rates than other age groups and are statistically more susceptible to fraud scams <ref type="bibr" target="#b28">[29]</ref>.</p><p>A survey of data protection and privacy professionals found that 66 percent believed their employees were the weakest link in protecting their organizations from cyberattacks <ref type="bibr" target="#b29">[30]</ref>. In spite of the automation of tedious cyber security tasks, it's still a good idea to provide employees with online security awareness trainings such as password security, phishing and importance of backing up files to prevent future issues <ref type="bibr" target="#b29">[30]</ref>.</p><p>As internet use among seniors increases, the elderly have become more vulnerable to online scams <ref type="bibr" target="#b30">[31]</ref>. A majority of seniors don't protect their internet-connected devices with passwords, leaving them vulnerable to those who pick them up <ref type="bibr" target="#b30">[31]</ref>. This group is also more likely to be at risk because they share their personal information through social media platforms like Facebook and Twitter, as well as have to use online services and apps to access health care, insurance, housing, voting, financial, and voting services <ref type="bibr" target="#b30">[31]</ref>.</p><p>Based on the observations and results of the studies that have been referred to for this research, the Table <ref type="table" target="#tab_1">2</ref> shows the things that need to be considered for cyber training specific to an individual's age.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Culture:</head><p>Social identity plays a definite role in how passwords are generated in different countries, with different users' attitudes towards passwords <ref type="bibr" target="#b20">[21]</ref>. Cyber security attitudes, values, and practices vary even among countries that share the same values, attitudes, and practices due to differences in development and Internet usage across nations <ref type="bibr" target="#b20">[21]</ref>. There is a significant difference between the average maturity stage of Europe and Americas compared with those of other regions, and the difference is large enough, that average maturity stages are the same across all regions <ref type="bibr" target="#b21">[22]</ref>. There is no statistically significant difference in the average maturity stage between the African and Asian regions, leading us to conclude that they are approximately equal in maturity <ref type="bibr" target="#b21">[22]</ref>.</p><p>America's national and economic security is at risk from malicious cyber activity <ref type="bibr">[32]</ref>. A key objective of the Based on publicly available data, ENISA Threat Landscape presents an overview of threats, threats agents, and threats trends in Europe, providing an independent view of observed threats, agents, and trends <ref type="bibr" target="#b31">[33]</ref>. Threats, major trends, threat actors, and attack techniques such as ransomware and malware, cryptojacking and online payment frauds are outlined in the 2021 report, along with mitigation measures <ref type="bibr" target="#b31">[33]</ref>.</p><p>Due to their weak cyber defenses, African countries have become a favourite target of international cybercriminals, and financial institutions are in particular at risk of financial fraud, data theft, and malware attacks <ref type="bibr" target="#b32">[34]</ref>. The biggest cyber threats in an African context include: online scams (such as phishing), digital extortion, business email compromise, ransomware and botnets <ref type="bibr" target="#b32">[34]</ref>. More than half of Asian companies (64 percent) have been affected by cyberattacks, and privacy breaches are the top concern for nearly 7 out of 10 respondents (68 percent), followed by ransomware (58 percent) <ref type="bibr" target="#b33">[35]</ref>. The majority of Asians perceive privacy breaches and data loss as the top cyber threats, but 26 percent haven't improved their security systems, while 31 percent haven't improved their data protection <ref type="bibr" target="#b33">[35]</ref>.</p><p>Based on the observations and results of the studies that have been referred to for this research, the Table <ref type="table" target="#tab_2">3</ref> shows the things that need to be considered for cyber training specific to an individual's culture.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">Emotions:</head><p>Cyber security response is not captured meaningfully on a sad-happy scale, but may vary based on context, individual identity, and action <ref type="bibr" target="#b22">[23]</ref>. Cyber security is viewed negatively by most people and these negative emotions are expressed unprompted <ref type="bibr" target="#b22">[23]</ref>. To ensure that unfamiliarity does not lead to uncertainty or negativity, cyber security training must take specific steps to ensure that they are sensitive to the fact that the concepts being introduced could trigger negative emotions and take particular measures to avoid this <ref type="bibr" target="#b23">[24]</ref>.</p><p>The emotions of women were more intense and affective, and the feelings of men were more likely to be fight/flight reactions <ref type="bibr" target="#b24">[25]</ref>. A female typically experiences more intense emotional reactions, more emotion during instances of cyberbullying, and is more prone to anxiety during instances of hacking. A male typically reacts more aggressively during such situations <ref type="bibr" target="#b24">[25]</ref>. Similarly, older people experience less negative affective events and have better emotion control skills, older people were more likely to have proactive and cognitive/motivational replies <ref type="bibr" target="#b24">[25]</ref>.</p><p>Cyber criminals often involve peoples' fears as primary weapons <ref type="bibr" target="#b34">[36]</ref>. The ransomware that affects corporate networks has caused havoc, and, while online media stokes people's fears, it may be easy to trick them into clicking links or opening emails that exploit these fears <ref type="bibr" target="#b34">[36]</ref>. A data breach or other security incident tends to stress everyone out and can lead to a variety of feelings, including denial in the first moments, panic, anger, anxiety, even guilt <ref type="bibr" target="#b35">[37]</ref>. In the midst of a crisis, and even before it begins, it is imperative to remain calm and collected <ref type="bibr" target="#b35">[37]</ref>. There has always been a reluctance among companies to disclose data breaches, much of it due to simple embarrassment <ref type="bibr" target="#b36">[38]</ref>. A malicious actor can misuse curiosity to boost the effectiveness of their campaign by weaponizing it <ref type="bibr" target="#b37">[39]</ref>. Our curiosity can lead us to act impulsively, without thinking things through, and sometimes even in an irrational manner <ref type="bibr" target="#b37">[39]</ref>. The ability to manipulate the target so the malicious actors can get away with mistakes or inconsistencies that the target would otherwise notice allows them to get away with mistakes <ref type="bibr" target="#b37">[39]</ref>.</p><p>Based on the observations and results of the studies that have been referred to for this research, the Table <ref type="table" target="#tab_3">4</ref> shows the things that need to be considered for cyber training specific to an individual's emotions. Thus, the above results, studied and observed from the previous studies referred for this research highlights the need of a personalised cyber security framework, answering the research questions (RQ1 And RQ2).  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.5.">Framework Implementation</head><p>Based on the observations and results, a personalised framework is developed using Typeform forms <ref type="bibr" target="#b38">[40]</ref>. The framework associates for cyber awareness training program for individuals. Guideline for the framework is provided in its introduction as shown in figure <ref type="figure">2</ref>.</p><p>Referring to figure <ref type="figure">3</ref>, the ideology is, first questions specific to the human factor (gender, age, culture and emotion evaluation) are asked. For emotion factor, two case scenarios are presented and options for individual's emotional reactions are provided. According to the options selected, the individual's emotional behaviour will be identified.</p><p>As shown in figure <ref type="figure" target="#fig_2">4</ref>, based on the responses to the four human factors, questions related to awareness/knowledge of specific topics are asked. If the individual is not aware of a particular topic, he/she will be guided to a link, providing the required knowledge. However,if an individual answers "yes", he/she will be provided with a test question to test their knowledge regarding the respective topic. If the answer is correct, they move to the next topic. However, if the test question is answered wrong, they will be provided with a training link that must be viewed to impart awareness about cyber influence of that particular human behavior.</p><p>The link to the developed personalised framework ishttps://5ugrgg9qtya.typeform.com/to/mvoXaGVn</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Research design</figDesc><graphic coords="4,92.68,88.57,199.29,101.24" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :Figure 3 :</head><label>23</label><figDesc>Figure 2: Framework Introduction</figDesc><graphic coords="7,92.68,168.56,199.30,80.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Awareness question example</figDesc><graphic coords="7,92.68,297.99,199.29,166.83" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Cyber-awareness required for specific Gender</figDesc><table><row><cell>Identifying as Male</cell><cell cols="2">Identifying as Female</cell></row><row><cell>Phishing crimes</cell><cell>Phishing crimes</cell></row><row><cell>Develop cybercrime aware-</cell><cell cols="2">Develop cybercrime aware-</cell></row><row><cell>ness</cell><cell>ness</cell></row><row><cell>Building self-efficacy</cell><cell cols="2">Improving self-efficacy</cell></row><row><cell>Generating strong pass-</cell><cell cols="2">Generating strong pass-</cell></row><row><cell>words</cell><cell>words</cell></row><row><cell>Awareness of cyberbully-</cell><cell cols="2">Awareness of cyberbully-</cell></row><row><cell>ing</cell><cell>ing</cell></row><row><cell></cell><cell cols="2">Build online sexual abuse</cell></row><row><cell></cell><cell>awareness</cell></row><row><cell></cell><cell>Awareness</cell><cell>against</cell></row><row><cell></cell><cell cols="2">cyber-stalking and cyber-</cell></row><row><cell></cell><cell>harassment</cell></row><row><cell cols="3">different stages of life experience different social, organi-</cell></row><row><cell cols="3">zational and environmental challenges and contexts</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2</head><label>2</label><figDesc>Cyber-awareness required for specific Age</figDesc><table><row><cell>0-18</cell><cell>18-25</cell><cell></cell><cell>25-50</cell><cell>50+</cell></row><row><cell>Self-</cell><cell cols="2">Cybercrime</cell><cell>Awareness</cell><cell>Awareness</cell></row><row><cell>efficacy</cell><cell cols="2">awareness</cell><cell>of phishing</cell><cell>of phishing</cell></row><row><cell>Internet</cell><cell cols="2">Internet ad-</cell><cell>Financial</cell><cell>Financial at-</cell></row><row><cell>addiction</cell><cell>diction</cell><cell></cell><cell>attacks</cell><cell>tacks</cell></row><row><cell>Fraud</cell><cell cols="2">Awareness</cell><cell>Password</cell><cell>Knowledge</cell></row><row><cell>attacks</cell><cell cols="2">of phishing</cell><cell>security</cell><cell>of viruses</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>and</cell><cell>soft-</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>ware</cell></row><row><cell></cell><cell cols="2">Fraud at-</cell><cell>Backing up</cell><cell>Fraud at-</cell></row><row><cell></cell><cell>tacks</cell><cell></cell><cell>files</cell><cell>tacks</cell></row><row><cell></cell><cell cols="2">Knowledge</cell><cell></cell><cell>Password</cell></row><row><cell></cell><cell cols="2">of viruses</cell><cell></cell><cell>security</cell></row><row><cell></cell><cell>and</cell><cell>soft-</cell><cell></cell></row><row><cell></cell><cell>ware</cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="2">Knowledge</cell><cell></cell></row><row><cell></cell><cell cols="2">of Cyber-</cell><cell></cell></row><row><cell></cell><cell cols="2">bullying</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 3</head><label>3</label><figDesc>Cyber-awareness required for specific Cultural background FBI's cyber strategy is to put cyber adversaries at risk and impose consequences on them, and to change the behavior of criminals and nation-states, who are confident they can compromise U.S. networks, steal intellectual property and financial assets, and threaten critical infrastructure without taking any risks themselves[32].</figDesc><table><row><cell>America</cell><cell>Europe</cell><cell></cell><cell cols="2">Asia and Africa</cell></row><row><cell>Awareness of</cell><cell>Awareness</cell><cell>of</cell><cell>Awareness</cell><cell>of</cell></row><row><cell>Ransomware</cell><cell>Ransomware</cell><cell></cell><cell>Ransomware</cell><cell></cell></row><row><cell></cell><cell>and Malware</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Knowledge of</cell><cell>Awareness</cell><cell>of</cell><cell>Awareness</cell><cell>of</cell></row><row><cell>politically moti-</cell><cell cols="2">politically moti-</cell><cell cols="2">politically moti-</cell></row><row><cell>vated attacks</cell><cell>vated attacks</cell><cell></cell><cell>vated attacks</cell><cell></cell></row><row><cell>Awareness of</cell><cell>Awareness</cell><cell>of</cell><cell>Awareness</cell><cell>of</cell></row><row><cell>Business Email</cell><cell cols="2">Crypto-jacking</cell><cell cols="2">Business Email</cell></row><row><cell>Compromise</cell><cell></cell><cell></cell><cell>Compromise</cell><cell></cell></row><row><cell>Personal motive</cell><cell cols="2">Denial of service</cell><cell>Awareness</cell><cell>of</cell></row><row><cell>attacks</cell><cell>attacks</cell><cell></cell><cell>server attacks</cell><cell></cell></row><row><cell></cell><cell cols="2">Online payment</cell><cell cols="2">Command-and-</cell></row><row><cell></cell><cell>frauds</cell><cell></cell><cell cols="2">control server</cell></row><row><cell></cell><cell></cell><cell></cell><cell>attacks</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 4</head><label>4</label><figDesc>Cyber-awareness required for specific Emotion</figDesc><table><row><cell>Anger</cell><cell cols="3">Curiosity Embarrassment Fear</cell></row><row><cell>Data</cell><cell>Phishing</cell><cell>Data breaches</cell><cell>Phishing</cell></row><row><cell>breaches</cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>Smishing</cell><cell>Ransomware</cell><cell>Ransomware</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusion</head><p>Research on existing cyber training and awareness programmes has been carried out. Its pros and cons were noted and impact of human factors such as gender. age, culture and emotions in context of cyber security were studied. The research conducted, helped develop a framework incorporating personalised training programme for trainees within organization. The personalised framework would help achieve the aims of this paper and overcome challenges from previous studies. The program would help an individual with specific age, gender, culture and emotions to build cyber awareness. The purpose of this framework is to help organisations review their security standards and improve them.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">The role of human factors/ergonomics in the science of security: Decision making and action selection in cyberspace</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">W</forename><surname>Proctor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Human factors</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="721" to="727" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Nifakos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Chandramouli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">K</forename><surname>Nikolaou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Papachristou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Koch</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Panaousis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bonacina</surname></persName>
		</author>
		<title level="m">Influence of human factors on cyber security within healthcare organisations: A systematic review, Sensors</title>
				<meeting><address><addrLine>Basel, Switzerland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page">5119</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues</title>
		<author>
			<persName><forename type="first">H</forename><surname>Aldawood</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Skinner</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Future internet</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page">73</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Gender difference and employees&apos; cybersecurity behaviors</title>
		<author>
			<persName><forename type="first">M</forename><surname>Anwar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>He</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Ash</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Xu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers in human behavior</title>
		<imprint>
			<biblScope unit="volume">69</biblScope>
			<biblScope unit="page" from="437" to="443" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Modern aspects of cyber-security training and continuous adaptation of programmes to trainees</title>
		<author>
			<persName><forename type="first">G</forename><surname>Hatzivasilis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ioannidis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Smyrlis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Spanoudakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Frati</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Goeke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Hildebrandt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Tsakirakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Oikonomou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Leftheriotis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Koshutanski</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied sciences</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">5702</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A large scale analysis of mhealth app user reviews</title>
		<author>
			<persName><forename type="first">O</forename><surname>Haggag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Grundy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abdelrazek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haggag</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Empir Software Eng</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page">196</biblScope>
			<date type="published" when="2022">2022. 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Improving cyber security awareness and training programs with data analytics</title>
		<author>
			<persName><forename type="first">K</forename><surname>Korpela</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information security journal</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="72" to="77" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">K</forename><surname>Parsons</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mccormac</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Butavicius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Ferguson</surname></persName>
		</author>
		<title level="m">Human Factors and Information Security: Individual, Culture and Security Environment</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Better identifying and addressing diverse issues in mhealth and emerging apps using user reviews</title>
		<author>
			<persName><forename type="first">O</forename><surname>Haggag</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The International Conference on Evaluation and Assessment in Software Engineering 2022</title>
				<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="329" to="335" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Covid-19 vs social media apps: Does privacy really matter?</title>
		<author>
			<persName><forename type="first">O</forename><surname>Haggag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haggag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Grundy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abdelrazek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS), IEEE</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="48" to="57" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Better addressing diverse accessibility issues in emerging apps: A case study using covid-19 apps</title>
		<author>
			<persName><forename type="first">O</forename><surname>Haggag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Grundy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Abdelrazek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Haggag</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th IEEE/ACM International Conference on Mobile Software Engineering and Systems 2022</title>
				<imprint>
			<publisher>Mo-bileSoft</publisher>
			<date type="published" when="2022">2022. 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Characterizing human aspects in reviews of covid-19 apps</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fazzini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Khalajzadeh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Haggag</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Obie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Arora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hussain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Grundy</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th IEEE/ACM International Conference on Mobile Software Engineering and Systems 2022</title>
				<meeting><address><addrLine>MobileSoft</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">2022. 2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">M</forename><surname>Bowen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Stolfo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Devarajan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Measuring the human factor of cyber security</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">8</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Correlating human traits and cyber security behavior intentions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gratian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bandi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cukier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Dykstra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ginther</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers security</title>
		<imprint>
			<biblScope unit="volume">73</biblScope>
			<biblScope unit="page" from="345" to="358" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Aspects of human weaknesses in cyber security, Scientific Bulletin</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mircea cel Bătrân&quot; Naval Academy)</title>
		<imprint>
			<biblScope unit="volume">XXII</biblScope>
			<biblScope unit="page" from="163" to="170" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Review and insight on the behavioral aspects of cybersecurity</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">A</forename><surname>Maalem Lahcen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Caulkins</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Mohapatra</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="1" to="18" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Cybersecurity awareness enhancement: A study of the effects of age and gender of thai employees associated with phishing attacks</title>
		<author>
			<persName><forename type="first">T</forename><surname>Daengsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Pornpongtechavanich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Wuttidittachotti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Education and information technologies</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="page" from="4729" to="4752" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Cybersecurity interventions for teens: Two timebased approaches</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">C</forename><surname>Amo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Frank</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">R</forename><surname>Rao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Upadhyaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE transactions on education</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="134" to="140" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Gender differences in predictors of technology threat avoidance</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">R</forename><surname>Gillam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Waite</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and computer security</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="page" from="393" to="412" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Gender and locale differences in cyber crime awareness among adolescents</title>
		<author>
			<persName><forename type="first">A</forename><surname>Thakur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">K</forename><surname>Kang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Indian journal of health and wellbeing</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="906" to="916" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">The current state of research on people, culture and cybersecurity</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Jeong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Oliver</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Creese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Thomas</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Personal and ubiquitous computing</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="809" to="812" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">The social and cultural shaping of cybersecurity capacity building: a comparative study of nations and regions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Creese</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">H</forename><surname>Dutton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Esteve-González</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Personal and ubiquitous computing</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="941" to="955" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Exploring cybersecurity-related emotions and finding that they are challenging to measure</title>
		<author>
			<persName><forename type="first">K</forename><surname>Renaud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Zimmermann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Schürmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Böhm</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Humanities social sciences communications</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="1" to="17" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Functional divergence of two threat-induced emotions: Fear-based versus anxiety-based cybersecurity preferences</title>
		<author>
			<persName><forename type="first">V</forename><surname>Cheung-Blunden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Cropper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Panis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Davis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Emotion</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="1353" to="1365" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Emotional reactions to cybersecurity breach situations: Scenario-based survey study</title>
		<author>
			<persName><forename type="first">S</forename><surname>Budimir</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Fontaine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>Huijts</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Haans</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Loukas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Roesch</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of medical Internet research</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="e24879" to="e24879" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://www.unicef.org/end-violence/how-to-stop-cyberbullying" />
		<title level="m">Cyberbullying: What is it and how to stop it</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<ptr target="https://www.legalserviceindia.com/legal/article-909-cyber-stalking-and-harassment-on-women.html" />
		<title level="m">Cyber stalking and harassment on women</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<title level="m" type="main">Training teenagers to ensure their own cybersecurity</title>
		<author>
			<persName><forename type="first">E</forename><surname>Chernova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Gavrilova</surname></persName>
		</author>
		<idno type="DOI">10.2991/aebmr.k.200312.417</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Cybersecurity awareness for students</title>
		<ptr target="https://www.cyberdegrees.org/resources/internet-safety-for-college-students/" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<author>
			<persName><forename type="first">R</forename><surname>Security</surname></persName>
		</author>
		<ptr target="https://blog.rsisecurity.com/cyber-security-training-for-employees/" />
		<title level="m">Cyber security training for employees</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<ptr target="https://www.illuminancesolutions.com.au/digital-literacy-seniors/" />
		<title level="m">Training -cyber security for seniors</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<monogr>
		<ptr target="https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends" />
		<title level="m">Threat landscape</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Mitchell</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Mitchell</surname></persName>
		</author>
		<ptr target="https://www.investmentmonitor.ai/analysis/africa-cyber-crime-threat-digitalisation" />
		<title level="m">Africa faces huge cyber crime threat as the pace of digitalisation increases</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<ptr target="https://www.livemint.com/technology/tech-news/64-of-firms-in-asia-have-been-impacted-by-cyberattacks\-survey-11657000676429.html" />
		<title level="m">Livemint, 64 percent of firms in asia have been impacted by cyberattacks: Survey</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title level="m" type="main">Cybercriminals and the exploitation of fear</title>
		<author>
			<persName><forename type="first">J</forename><surname>Bolden</surname></persName>
		</author>
		<ptr target="https://www.questsys.com/security-blog/Cybercriminals-and-the-Exploitation-of-Fear/" />
		<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">anger, and guilt</title>
		<author>
			<persName><forename type="first">A</forename><surname>Fiscutean</surname></persName>
		</author>
		<ptr target="https://www.csoonline.com/article/3646616/the-emotional-stages-of-a-data-breach-how-to-deal-with\-panic-anger-and-guilt.html" />
	</analytic>
	<monogr>
		<title level="m">The emotional stages of a data breach: How to deal with panic</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<title level="m" type="main">Don&apos;t let embarrassment about a data breach cost you even more</title>
		<author>
			<persName><forename type="first">E</forename><surname>Schuman</surname></persName>
		</author>
		<ptr target="https://www.csoonline.com/article/3052193/don-t-let-embarrassment-about-a-data-breach-cost-you\-even-more.html" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<ptr target="https://www.hoxhunt.com/blog/youve-been-mentioned-how-hackers-exploit-curiosity" />
		<title level="m">How hackers exploit curiosity</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b38">
	<monogr>
		<ptr target="https://try.typeform.com/home/" />
		<title level="m">Forms that perform: Get feedback and leads with ease</title>
				<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
