=Paper=
{{Paper
|id=Vol-3356/paper10
|storemode=property
|title=Diving Deep into Human Centric Issues within Cyber Security
|pdfUrl=https://ceur-ws.org/Vol-3356/paper-10.pdf
|volume=Vol-3356
|authors=Kalpit Jadhav,Sherif Haggag,Hussein Haggag
|dblpUrl=https://dblp.org/rec/conf/apsec/JadhavHH22
}}
==Diving Deep into Human Centric Issues within Cyber Security==
Diving Deep into Human Centric Issues within Cyber
Security
Kalpit Jadhav1,2 , Sherif Haggag3 and Hussein Haggag4
1
The University of Adelaide, Adelaide, Australia
3
The University of Adelaide, Adelaide, Australia
4
Umeå University, Sweden
Abstract
Computer security is more than just about the technological systems; it also relates to the people that use the systems and
how their different behaviours may be exploited. Organizations are prone to security breaches, which sometimes are caused
by human error. As a result, organizations should seek to improve their employees’ knowledge about cyber security and
their capability to engage in secure cyber behaviours. It is possible to target groups ranging from basic users who need some
basic understanding of the current threat environment and how to utilize the associated preventive mechanisms, to security
experts who need practical exposure in responding to security incidents. Risk-taking preferences, decision-making styles,
demographics, and personality characteristics, such as gender, age, culture and emotions, have been found to significantly
affect the predictive ability of good security behavior. How gender and age mediate the influences on cyber security beliefs
and behaviours among employees is quite interesting. Using behavioural cyber security and human factors to provide insight
into relevant theories and principles, this paper proposes an interdisciplinary framework that combines these disciplines.
Keywords
cyber security, human factors, social engineering, framework
1. Introduction sential to developing effective cyber security programs
for the workplace [4]. In addition to training materials,
Humans play an important role in security measures, policies and frameworks, information about preventive
thus research on security-related decisions and actions measures to be followed before and after an attack must
based on human "information-processing and decision- also be undertaken.
making principles" is necessary [1]. Cyber security’s The age, gender, or cultural background may make
"human factors" are concerned with the role that hu- a person more susceptible to some malicious act [5, 6].
man behaviour plays in preventing and responding to Researchers have found that women are more likely to
cyberattacks [2]. Additionally to cyberattacks aimed at fall victim to phishing scams than men, and so are people
targeting network infrastructures, a variant of cyberat- between 18 to 25 years of age [7]. In order to combat such
tack, designed specifically to exploit the vulnerabilities of limitations and biases, companies should establish clear
individuals; these are social engineering attacks [2]. So- security guidelines and educate their employees about
cial engineering aims to obtain illegal access to sensitive them. Organizations can achieve satisfying results in
and confidential information by manipulating individ- response to social engineering attacks by improving their
uals’ psychological states [3]. Because employees can information security frameworks including the training
contribute to protect the interests of organizations in and awareness programs.
the face of social engineered attacks, organizations find In this research we aim to address the two key
the need to implement information security awareness research questions:
programs to secure their data [3]. Understanding the se-
curity behaviour of both men and women, and whether RQ1 – What factors that influence human suscepti-
their security behaviours are similar or different, is es- bility to cybercrime and social engineering attacks are
reported in the peer reviewed literature?
Asia-Pacific software engineering and diversity, equity, and inclusion Individuals are more susceptible to social engineering
(APSEDEI), Japan, Nov. 15-21, 2022 attacks for a variety of reasons. In general, social
*
Corresponding author.
† engineering attempts appear more effective if the
These authors contributed equally.
attacker is able to establish trust with the victim, putting
$ kalpit1612kpj@gmail.com (K. Jadhav);
sherif.haggag@adelaide.edu.au (S. Haggag); them at greater risk [8]. Individual factors or personality
hussein.haggag@umu.se (H. Haggag) traits can also increase the likelihood of someone falling
0000-0002-XXXX-XXXX (K. Jadhav); 0000-0001-XXXX-XXXX victim to social engineering attacks. It is possible
(S. Haggag); 0000-0002-XXXX-XXXX (H. Haggag) to increase the effectiveness of phishing emails and
© 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License
Attribution 4.0 International (CC BY 4.0). illegitimate websites by using a number of strategies. In
CEUR
Workshop
Proceedings
http://ceur-ws.org
ISSN 1613-0073
CEUR Workshop Proceedings (CEUR-WS.org)
this research, we highlight the various human factors goes on to more advanced learning methods which in-
that can make an individual more susceptible to attack volve multiple hands-on exercises on emulated/simulated
as reported in the academic literature. components [5]. The performance is evaluated and a
preliminary application is presented, where a training
RQ2 – Why do we need a personalised cyber programme for smart shipping personnel is established
security framework for training employees within an [5].
organisation? Factors that may help overcome the difficulties posed
Personalized cyber security frameworks will enhance the by implementing a training and awareness program
existing security protocols and methodologies followed against social engineering are studied in research by Al-
during training and will incorporate new security layers dawood and Skinner [3]. The authors describe the need of
which will consider even the human factors that impact information security training and awareness programs is
an individual’s cyber behaviour and awareness. to harness employees with skills to identify, disable, and
report any social engineering attempts to misuse their
Section 2 of this research highlights the aims and chal- resources. The study also makes recommendations based
lenges that this paper intends to overcome. Section 3 on the viewpoint of security decision makers within or-
presents literature review studied from different research ganizations on how to address challenges [9, 10, 11, 12].
papers in order to formulate results. The design and Key issues faced by cyber security training and aware-
plan followed in this research has been presented in sec- ness programs have been identified in research by Kor-
tion 4. The results identified and formulated have been pela [7] and the probable benefits that can be derived by
explained and tabulated in section 5. combining existing data sources to enhance these pro-
grams using learning analytics which is an upcoming
field in data analytics has been explained. The author
2. Aims and challenges even mentions that in order to potentially improve cyber
security metrics, organizations and professionals should
Training and awareness programs present several chal-
harness the use of data analytics to tackle the issues of
lenges such as "business environmental, social, constitu-
how users fail to identify risks and a ’lack of understand-
tional, organizational, economical, and personal". ’Trust-
ing on how cyber security is best learned by its users
ing nature of humans’ is another factor that hinders
[7].
awareness and training programs against social engineer-
Importance of putting in place formal educational and
ing is a low level of interest found within the personnel.
training standards to enable organisations to manage
Moreover, problem with modern training techniques is
human factors related to cyber security effectively has
that they take a lot of time and even lack training budget
been highlighted in the research of Nifakos et al [2], ul-
[3].
timately reducing cyber risks. The research examined
The absence of cybercrime, which is instrumental in
human factors, but a systematic methodology for har-
exploiting both the vulnerabilities of systems and human
monising the research findings should be developed to
weaknesses, is one of the biggest obstacles to implement-
allow cyber security experts to objectively evaluate these
ing digital transformation strategies. Employees must be
findings in order to support securing the IT infrastructure
provided with the proper training in order for them to
of healthcare facilities in future research [2].
be able to recognize, flag, evade, and disable malicious
How an interdisciplinary approach based on a human
attacks [3]. To upgrade the cyber security training pro-
factors approach can contribute to the science of security
grammes more human centric, an awareness or training
has been conveyed in the research of Proctor and Chen
framework must be implemented for all personnel, which
[1]. The authors describe the importance of human fac-
include the major cyber risk aspects and its awareness
tors in security by using two examples that illustrate the
factors [5].
contribution of a scientific approach to security detection
There is a need to investigate the similarities and dif-
of phishing attacks and the selection of mobile applica-
ferences between men and women with regard to cyber
tions [1]. Finally, they conclude that in order to con-
security beliefs and behaviours like personality, cultural
tribute to cyber security, human factors experts should
background, emotion reaction, age, and motivation.
utilize their existing knowledge of applied information
processing and decision making [1].
3. Literature review Methods for measuring, quantifying, and evaluating
human organizations’ security posture, especially those
Hatzivasilis et al. in [5], describe a methodology to adapt within large corporations and government organizations
cyber security training programmes dynamically. They have been investigated by Brian et al in their research
mention how a trainee consumes the primary teaching [13]. The study presents the results of two rounds of
materials such as lectures, tutorials, videos, etc. and experiments conducted at Columbia University using bo-
gus phishing emails to train approximately 4000 staff and by a second phishing attack that had different content
students [13]. The authors further suggest that it is pos- [17]. According to the results of the study, gender plays
sible to train users using decoy technology to anticipate a significant role in cyber security awareness within the
possible threats, and the measurements can be applied to Thai cyber ecosystem since Thai female employees have
multiple organizations in order to gauge their security a higher level of cyber security awareness than male
posture as compared to each other [13]. employees as well as the differences between the ages
Correlation of human characteristics with cyber secu- of Thai users’ cyber security awareness [17]. Although
rity behaviour intentions has been researched by Gratian this research is just limited to Thai employees but can be
et al [14]. The study estimated that 5 to 23 percent of considered in general sense too.
the variance in the reported cyber security behaviour in- By identifying effective ways to encourage cyber secu-
tentions was attributable to individual differences based rity education development and address gender gaps in
on demographic factors, personality traits, risk-taking the cyber security workforce, the overall goal in study by
preferences, and decision-making styles in 369 students, Amo et al. [18] is to contribute to the literature on cyber
faculty, and staff at a large public university [14]. security education. Their findings indicate that female
The purpose of study by Anwar et al. [4] was to in- students were significantly more engaged and efficacious
vestigate the effect of gender as a deciding variable in in cyber security, which is quite promising in regards to
the relationship among the psychosocial factors and self- gender gaps in cyber security [18].
reported cyber security behaviours among staff of diverse The study by Gillam and Waite [19] sought to iden-
organizations. The results of this study indicate statisti- tify the psychological factors that influence workplace IT
cally significant differences between men and women in end users’ motivation to learn about cyber awareness and
terms of computer skills, prior experience, cues-to-action, avoid threats. As a result of this study, gender-related
and security self-efficacy. Self-efficacy among women is considerations were revealed that can be used to guide
significantly lower than that among men, so they could cyber security training of IT end-users such as threat
be possibly targeted for intervention [4]. Thus, they con- avoidance in human resource development contexts, es-
clude that by addressing the relevant constructs of the pecially when it comes to motivation [19].
cyber security behaviour, we can develop gender-specific Study of ’Gender and locale differences in cybercrime
cyber security training and interventions to improve em- awareness among adolescents’ was conducted by Thakur
ployees’ attitudes and behaviour [4]. and Kaur [20]. The findings showed that there were
Human factor is one of the major contributors to the significant gender differences between rural and urban
vulnerabilities of an information system, and disparate young males and young females in terms of cybercrime
attack vectors which are being utilized today to exploit awareness.
human weaknesses have been examined in research by By bringing together research from unique and diverse
Radu et al [15]. The authors further state that a social en- disciplinary backgrounds, study by Jeong et al. [21] en-
gineering awareness and training program must ensure ables us to increase our understanding and provide a
that employees have a basic understanding of how social framework for effective cyber security strategies by pro-
engineering attacks are conducted [15]. Furthermore, viding a comprehensive overview of the socio-cultural
employees must have the knowledge and training neces- dimensions of cyber security. This special issue addresses
sary to detect an attack, respond appropriately, and find people, culture, and cyber security research that enriches
a way to prevent exposure to social engineering threats our understanding of them. Following the expert review
[15]. process, a framework and assessment tool were devel-
Review of relevant theories and principles which pro- oped to highlight strengths, weaknesses, and opportuni-
vide insight through an interdisciplinary framework that ties [21].
encompasses human factors, behavioural cyber secu- The analysis in research by Creese [22] identifies that
rity, and modelling and simulation has been carried out on the basis of their development and the extent of
Maalem et al [16]. The authors mention that it is impor- their Internet use, some countries have demonstrated
tant to customize cyber awareness training to employees greater maturity in capacity building than were expected.
considering their different credentials and levels of access. Through a cross-national and cross-regional compari-
They further state that employees need to be trusted, but son of capacity building, this paper shows regional dif-
they must also be taught technology and cyber aware- ferences are largely influenced by two key national dif-
ness, and compliance needs to be verified [16]. ferences in the extent of Internet use and the level of
An extensive financial institution in Thailand con- development [22].
ducted study in research by Daengsi et al. [17] to assess A three-part study of people’s perceptions of cyber se-
cyber security awareness among approximately 20,000 curity is presented by Renaud et al [23]. Several aspects
employees. An initial phishing attack was conducted of people’s lived cyber security experiences were con-
where knowledge transfer was achieved and followed firmed by the investigation where one blind spot issue
The figure 1 shows that existing cyber training and
awareness programs are modified by adding the different
human factors which have been mentioned in the paper.
This helps to develop a personalised cyber training frame-
work. The framework developed and evaluated would
be used to train an individual exhibiting specific human
centeric factors to build their cyber awareness.
5. Results
Figure 1: Research design
5.1. Gender:
Study has been conducted for cyber risk assessment
where as a part of the test, a phishing email offering
was identified along with negative attitude of people to- more Gmail storage was sent by the experts [17]. The
ward cyber security that are widespread but not universal data from this test was gathered, processed, and analysed
is studied [23]. and found that female employees’ responses were always
Using open-ended responses from a pilot study and lower than those of male employees [17]. It indicates that
congressional debates, research by Cheung-Blunden et females have a better level of cyber security awareness
al. [24] sought to identify behavioral categories in cyber of phishing than males [17]. A positive growth pattern
security solutions. By distinguishing fear, three types of in cyber security self-efficacy is observed in females com-
safety behaviors which are avoidance, surveillance and pared to males and females gained more problem-solving
vigilance were identified in this study and were expected proficiency than males over time [18]. While young fe-
to be mutually exclusive because emotion was expected males have higher mean values than young males in cases
to have unique motivational power [24]. where there is a high level of cybercrime awareness, they
A hacking of one’s smart security camera represents are ahead in cases of medium levels, and in cases where
one of the most emblematic examples of a cyber security there is a low level of cybercrime awareness, young fe-
breach, and study by Budimir et al. [25] explored which males tend to have higher mean values than young males
personality characteristics systematically relate to these [20].
processes. An important link between a cyber security Males tend to react more aggressively to cyberbully-
breach situation and possible long-term mental health ing and have a deeper emotional response in situations
effects was discovered in this study [25]. of hacking, while females tend to have more intense
emotional reactions. Using digital technologies, cyber-
bullying involves repeated behavior meant to intimidate,
4. Research plan and Methodology anger, or shame the target [26]. Mobile phones, mes-
saging platforms, gaming platforms, and social media
The research implementation is carried out in two phases. platforms can all be used for this [26]. ’Remote sexual
The first phase is about carrying out an in depth analysis abuse’ occurs more often against women and girls than
and researching into the topic of human centric issues men - coerced to pose naked online or stalked via internet
of cyber security. It involves referring of research pa- [27]. The term cyberstalking means stalking someone
pers and articles through the use of university library through the use of the internet. Stalkers are using email
and other platforms. Investigation on the importance of message applications, posting messages on the web, and
human centric aspects in cyber security, how to build sometimes even social media, such as Facebook, Insta-
apps and training materials applicable with personality, gram, and many more, to continually try to approach
gender, cultural background, emotion reaction, age, moti- someone online without their consent [27].
vation, and hidden biases is carried out. The second phase Based on the observations and results of the studies
involves development of a framework which includes the that have been referred to for this research, the Table 1
above-mentioned aspects and to provide guidelines as to shows the things that need to be considered for cyber
how the framework can be useful for organizations for training specific to an individual’s gender.
carrying out cyber trainings and awareness programmes.
A secondary research methodology is employed in this
5.2. Age:
research, since this study relies on already existing data.
Various sources such as published journals and reports A person’s age can also be considered a crucial factor
in the University library and websites are used for the when determining a person’s identity, since people at
collection, organization, and analysis of data.
Table 1 Table 2
Cyber-awareness required for specific Gender Cyber-awareness required for specific Age
Identifying as Male Identifying as Female 0-18 18-25 25–50 50+
Phishing crimes Phishing crimes Self- Cybercrime Awareness Awareness
Develop cybercrime aware- Develop cybercrime aware- efficacy awareness of phishing of phishing
ness ness Internet Internet ad- Financial Financial at-
Building self-efficacy Improving self-efficacy addiction diction attacks tacks
Generating strong pass- Generating strong pass- Fraud Awareness Password Knowledge
words words attacks of phishing security of viruses
Awareness of cyberbully- Awareness of cyberbully- and soft-
ing ing ware
Build online sexual abuse Fraud at- Backing up Fraud at-
awareness tacks files tacks
Awareness against Knowledge Password
cyber-stalking and cyber- of viruses security
harassment and soft-
ware
Knowledge
different stages of life experience different social, organi- of Cyber-
bullying
zational and environmental challenges and contexts [17].
Self-efficacy and precautionary behavior were signifi-
cantly positively correlated with self-efficacy in young-
sters, but in older group the correlation was negatively up files to prevent future issues [30].
significant, but not statistically significant [19]. As internet use among seniors increases, the elderly
Adolescents are most at risk for Cybercrime due to have become more vulnerable to online scams [31]. A
their attraction to the internet [20]. Therefore, adoles- majority of seniors don’t protect their internet-connected
cents are very much in need of awareness/knowledge devices with passwords, leaving them vulnerable to those
related to cybercrime, since failure to do so can harm who pick them up [31]. This group is also more likely to
them financially or emotionally [20]. The teenager is be at risk because they share their personal information
already seeking the truth only through his own experi- through social media platforms like Facebook and Twitter,
ences, if the child is ready to obey the authority of an as well as have to use online services and apps to access
adult, this is the age of active knowledge and personal health care, insurance, housing, voting, financial, and
development [28]. Teenagers often commit acts that can voting services [31].
lead to undesirable consequences for the simple reason Based on the observations and results of the studies
that they try to protect themselves from adults’ influence, that have been referred to for this research, the Table 2
and they are easy targets for criminals because of their shows the things that need to be considered for cyber
curiosity, openness, and lack of experience [28]. training specific to an individual’s age.
People between 18 and 25 years old are more vulnera-
ble to phishing scams [7]. Every day, college students use 5.3. Culture:
the internet for work and pleasure - to complete research
Social identity plays a definite role in how passwords
for essays and assignments, to stay connected on social
are generated in different countries, with different users’
media, to make online purchases, and to keep up-to-date
attitudes towards passwords [21]. Cyber security atti-
on entertainment news [29]. In the age of cybercrime,
tudes, values, and practices vary even among countries
the sheer amount of data we share online puts us all at
that share the same values, attitudes, and practices due
risk. It is more likely that young people and college stu-
to differences in development and Internet usage across
dents will fall for fraud scams as they use social media at
nations [21]. There is a significant difference between
higher rates than other age groups and are statistically
the average maturity stage of Europe and Americas com-
more susceptible to fraud scams [29].
pared with those of other regions, and the difference is
A survey of data protection and privacy profession-
large enough, that average maturity stages are the same
als found that 66 percent believed their employees were
across all regions [22]. There is no statistically signifi-
the weakest link in protecting their organizations from
cant difference in the average maturity stage between
cyberattacks [30]. In spite of the automation of tedious
the African and Asian regions, leading us to conclude
cyber security tasks, it’s still a good idea to provide em-
that they are approximately equal in maturity [22].
ployees with online security awareness trainings such as
America’s national and economic security is at risk
password security, phishing and importance of backing
from malicious cyber activity [32]. A key objective of the
Table 3 5.4. Emotions:
Cyber-awareness required for specific Cultural background
Cyber security response is not captured meaningfully
America Europe Asia and Africa on a sad–happy scale, but may vary based on context,
Awareness of Awareness of Awareness of individual identity, and action [23]. Cyber security is
Ransomware Ransomware Ransomware
viewed negatively by most people and these negative
and Malware
emotions are expressed unprompted [23]. To ensure that
Knowledge of Awareness of Awareness of
politically moti- politically moti- politically moti-
unfamiliarity does not lead to uncertainty or negativity,
vated attacks vated attacks vated attacks cyber security training must take specific steps to ensure
Awareness of Awareness of Awareness of that they are sensitive to the fact that the concepts be-
Business Email Crypto-jacking Business Email ing introduced could trigger negative emotions and take
Compromise Compromise particular measures to avoid this [24].
Personal motive Denial of service Awareness of The emotions of women were more intense and af-
attacks attacks server attacks fective, and the feelings of men were more likely to be
Online payment Command-and- fight/flight reactions [25]. A female typically experiences
frauds control server more intense emotional reactions, more emotion during
attacks instances of cyberbullying, and is more prone to anxi-
ety during instances of hacking. A male typically reacts
more aggressively during such situations [25]. Similarly,
FBI’s cyber strategy is to put cyber adversaries at risk and older people experience less negative affective events
impose consequences on them, and to change the behav- and have better emotion control skills, older people were
ior of criminals and nation-states, who are confident they more likely to have proactive and cognitive/motivational
can compromise U.S. networks, steal intellectual property replies [25].
and financial assets, and threaten critical infrastructure Cyber criminals often involve peoples’ fears as primary
without taking any risks themselves [32]. weapons [36]. The ransomware that affects corporate net-
Based on publicly available data, ENISA Threat Land- works has caused havoc, and, while online media stokes
scape presents an overview of threats, threats agents, people’s fears, it may be easy to trick them into clicking
and threats trends in Europe, providing an independent links or opening emails that exploit these fears [36]. A
view of observed threats, agents, and trends [33]. Threats, data breach or other security incident tends to stress ev-
major trends, threat actors, and attack techniques such eryone out and can lead to a variety of feelings, including
as ransomware and malware, cryptojacking and online denial in the first moments, panic, anger, anxiety, even
payment frauds are outlined in the 2021 report, along guilt [37]. In the midst of a crisis, and even before it
with mitigation measures [33]. begins, it is imperative to remain calm and collected [37].
Due to their weak cyber defenses, African countries There has always been a reluctance among companies to
have become a favourite target of international cyber- disclose data breaches, much of it due to simple embar-
criminals, and financial institutions are in particular at rassment [38]. A malicious actor can misuse curiosity to
risk of financial fraud, data theft, and malware attacks boost the effectiveness of their campaign by weaponiz-
[34]. The biggest cyber threats in an African context in- ing it [39]. Our curiosity can lead us to act impulsively,
clude: online scams (such as phishing), digital extortion, without thinking things through, and sometimes even in
business email compromise, ransomware and botnets an irrational manner [39]. The ability to manipulate the
[34]. More than half of Asian companies (64 percent) target so the malicious actors can get away with mistakes
have been affected by cyberattacks, and privacy breaches or inconsistencies that the target would otherwise notice
are the top concern for nearly 7 out of 10 respondents (68 allows them to get away with mistakes [39].
percent), followed by ransomware (58 percent) [35]. The Based on the observations and results of the studies
majority of Asians perceive privacy breaches and data that have been referred to for this research, the Table 4
loss as the top cyber threats, but 26 percent haven’t im- shows the things that need to be considered for cyber
proved their security systems, while 31 percent haven’t training specific to an individual’s emotions.
improved their data protection [35].
Based on the observations and results of the studies
that have been referred to for this research, the Table 3
shows the things that need to be considered for cyber Thus, the above results, studied and observed from the
training specific to an individual’s culture. previous studies referred for this research highlights
the need of a personalised cyber security framework,
answering the research questions (RQ1 And RQ2).
Table 4
Cyber-awareness required for specific Emotion
Anger Curiosity Embarrassment Fear
Data Phishing Data breaches Phishing
breaches
Smishing Ransomware Ransomware
Figure 2: Framework Introduction
Figure 4: Awareness question example
four human factors, questions related to awareness/-
knowledge of specific topics are asked. If the individual
is not aware of a particular topic, he/she will be guided
to a link, providing the required knowledge. However,if
an individual answers "yes", he/she will be provided
with a test question to test their knowledge regarding
the respective topic. If the answer is correct, they
move to the next topic. However, if the test question is
answered wrong, they will be provided with a training
link that must be viewed to impart awareness about
cyber influence of that particular human behavior.
The link to the developed personalised framework is -
Figure 3: Questions on Human Factors https://5ugrgg9qtya.typeform.com/to/mvoXaGVn
6. Conclusion
5.5. Framework Implementation
Based on the observations and results, a personalised Research on existing cyber training and awareness pro-
framework is developed using Typeform forms [40]. The grammes has been carried out. Its pros and cons were
framework associates for cyber awareness training pro- noted and impact of human factors such as gender. age,
gram for individuals. Guideline for the framework is culture and emotions in context of cyber security were
provided in its introduction as shown in figure 2. studied. The research conducted, helped develop a frame-
Referring to figure 3, the ideology is, first questions work incorporating personalised training programme for
specific to the human factor (gender, age, culture and trainees within organization. The personalised frame-
emotion evaluation) are asked. For emotion factor, two work would help achieve the aims of this paper and over-
case scenarios are presented and options for individual’s come challenges from previous studies. The program
emotional reactions are provided. According to the op- would help an individual with specific age, gender, cul-
tions selected, the individual’s emotional behaviour will ture and emotions to build cyber awareness. The purpose
be identified. of this framework is to help organisations review their
As shown in figure 4, based on the responses to the security standards and improve them.
References on Mobile Software Engineering and Systems 2022
(MobileSoft 2022), 2022.
[1] R. W. Proctor, J. Chen, The role of human factors/er- [13] B. M. Bowen, S. J. Stolfo, R. Devarajan, Measur-
gonomics in the science of security: Decision mak- ing the human factor of cyber security, Homeland
ing and action selection in cyberspace, Human security affairs 8 (2012).
factors 57 (2015) 721–727. [14] M. Gratian, S. Bandi, M. Cukier, J. Dykstra,
[2] S. Nifakos, K. Chandramouli, C. K. Nikolaou, P. Pa- A. Ginther, Correlating human traits and cyber
pachristou, S. Koch, E. Panaousis, S. Bonacina, In- security behavior intentions, Computers security
fluence of human factors on cyber security within 73 (2018) 345–358.
healthcare organisations: A systematic review, Sen- [15] M. R., Aspects of human weaknesses in cyber secu-
sors (Basel, Switzerland) 21 (2021) 5119–. rity, Scientific Bulletin ("Mircea cel Bătrân" Naval
[3] H. Aldawood, G. Skinner, Reviewing cyber secu- Academy) XXII (2019) 163–170.
rity social engineering training and awareness pro- [16] R. A. Maalem Lahcen, B. Caulkins, R. Mohapatra,
grams—pitfalls and ongoing issues, Future internet M. Kumar, Review and insight on the behavioral
11 (2019) 73–. aspects of cybersecurity, Cybersecurity 3 (2020)
[4] M. Anwar, W. He, I. Ash, X. Yuan, L. Li, L. Xu, 1–18.
Gender difference and employees’ cybersecurity [17] T. Daengsi, P. Pornpongtechavanich, P. Wuttiditta-
behaviors, Computers in human behavior 69 (2017) chotti, Cybersecurity awareness enhancement: A
437–443. study of the effects of age and gender of thai em-
[5] G. Hatzivasilis, S. Ioannidis, M. Smyrlis, ployees associated with phishing attacks, Education
G. Spanoudakis, F. Frati, L. Goeke, T. Hildebrandt, and information technologies 27 (2021) 4729–4752.
G. Tsakirakis, F. Oikonomou, G. Leftheriotis, [18] L. C. Amo, R. Liao, E. Frank, H. R. Rao, S. Upadhyaya,
H. Koshutanski, Modern aspects of cyber-security Cybersecurity interventions for teens: Two time-
training and continuous adaptation of programmes based approaches, IEEE transactions on education
to trainees, Applied sciences 10 (2020) 5702–. 62 (2019) 134–140.
[6] O. Haggag, J. Grundy, M. Abdelrazek, S. Haggag, [19] A. R. Gillam, A. M. Waite, Gender differences in pre-
A large scale analysis of mhealth app user reviews, dictors of technology threat avoidance, Information
in: Empir Software Eng 27, 196 (2022), 2022. and computer security 29 (2021) 393–412.
[7] K. Korpela, Improving cyber security awareness [20] A. Thakur, T. K. Kang, Gender and locale differ-
and training programs with data analytics, Infor- ences in cyber crime awareness among adolescents,
mation security journal. 24 (2015) 72–77. Indian journal of health and wellbeing 9 (2018) 906–
[8] K. Parsons, A. McCormac, M. Butavicius, L. Fergu- 916.
son, Human Factors and Information Security: In- [21] J. J. Jeong, G. Oliver, E. Kang, S. Creese, P. Thomas,
dividual, Culture and Security Environment, 2010. The current state of research on people, culture and
[9] O. Haggag, Better identifying and addressing di- cybersecurity, Personal and ubiquitous computing
verse issues in mhealth and emerging apps using 25 (2021) 809–812.
user reviews, in: The International Conference on [22] S. Creese, W. H. Dutton, P. Esteve-González, The
Evaluation and Assessment in Software Engineer- social and cultural shaping of cybersecurity capac-
ing 2022, 2022, pp. 329–335. ity building: a comparative study of nations and
[10] O. Haggag, S. Haggag, J. Grundy, M. Abdelrazek, regions, Personal and ubiquitous computing 25
Covid-19 vs social media apps: Does privacy really (2021) 941–955.
matter?, in: 2021 IEEE/ACM 43rd International [23] K. Renaud, V. Zimmermann, T. Schürmann,
Conference on Software Engineering: Software En- C. Böhm, Exploring cybersecurity-related emo-
gineering in Society (ICSE-SEIS), IEEE, 2021, pp. tions and finding that they are challenging to mea-
48–57. sure, Humanities social sciences communications
[11] O. Haggag, J. Grundy, M. Abdelrazek, S. Haggag, 8 (2021) 1–17.
Better addressing diverse accessibility issues in [24] V. Cheung-Blunden, K. Cropper, A. Panis, K. Davis,
emerging apps: A case study using covid-19 apps, Functional divergence of two threat-induced emo-
in: 9th IEEE/ACM International Conference on Mo- tions: Fear-based versus anxiety-based cybersecu-
bile Software Engineering and Systems 2022 (Mo- rity preferences, Emotion (Washington, D.C.) 19
bileSoft 2022), 2022. (2019) 1353–1365.
[12] M. Fazzini, H. Khalajzadeh, O. Haggag, Z. Li, [25] S. Budimir, J. Fontaine, N. M. Huijts, A. Haans,
H. Obie, C. Arora, W. Hussain, J. Grundy, Char- G. Loukas, E. Roesch, Emotional reactions to cyber-
acterizing human aspects in reviews of covid-19 security breach situations: Scenario-based survey
apps, in: 9th IEEE/ACM International Conference study, Journal of medical Internet research 23 (2021)
e24879–e24879.
[26] Cyberbullying: What is it and how to stop it,
???? URL: https://www.unicef.org/end-violence/
how-to-stop-cyberbullying.
[27] Cyber stalking and harassment on women, ????
URL: https://www.legalserviceindia.com/legal/
article-909-cyber-stalking-and-harassment-on-women.
html.
[28] E. Chernova, I. Gavrilova, Training teenagers to en-
sure their own cybersecurity, 2020. doi:10.2991/
aebmr.k.200312.417.
[29] Cybersecurity awareness for students, 2022.
URL: https://www.cyberdegrees.org/resources/
internet-safety-for-college-students/.
[30] R. Security, Cyber security training for em-
ployees, 2022. URL: https://blog.rsisecurity.com/
cyber-security-training-for-employees/.
[31] Training – cyber security for seniors, 2021.
URL: https://www.illuminancesolutions.com.au/
digital-literacy-seniors/.
[32] Cyber crime, 2016. URL: https://www.fbi.gov/
investigate/cyber#Overview.
[33] Threat landscape, 2022. URL: https://www.
enisa.europa.eu/topics/threat-risk-management/
threats-and-trends.
[34] J. Mitchell, J. Mitchell, Africa faces huge cyber crime
threat as the pace of digitalisation increases, 2022.
URL: https://www.investmentmonitor.ai/analysis/
africa-cyber-crime-threat-digitalisation.
[35] Livemint, 64 percent of firms in asia have been
impacted by cyberattacks: Survey, 2022. URL: https:
//www.livemint.com/technology/tech-news/
64-of-firms-in-asia-have-been-impacted-by-cyberattacks\
-survey-11657000676429.html.
[36] J. Bolden, Cybercriminals and the ex-
ploitation of fear, 2022. URL: https:
//www.questsys.com/security-blog/
Cybercriminals-and-the-Exploitation-of-Fear/.
[37] A. Fiscutean, The emotional stages of a data breach:
How to deal with panic, anger, and guilt, 2022.
URL: https://www.csoonline.com/article/3646616/
the-emotional-stages-of-a-data-breach-how-to-deal-with\
-panic-anger-and-guilt.html.
[38] E. Schuman, Don’t let embarrassment about
a data breach cost you even more, 2016. URL:
https://www.csoonline.com/article/3052193/
don-t-let-embarrassment-about-a-data-breach-cost-you\
-even-more.html.
[39] How hackers exploit curiosity, ????
URL: https://www.hoxhunt.com/blog/
youve-been-mentioned-how-hackers-exploit-curiosity.
[40] Forms that perform: Get feedback and leads with
ease, ???? URL: https://try.typeform.com/home/.