2023
DOI: 10.1145/3631341.3631348
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of SETA Methods and Linkage to Delivery Preferences

Joakim Kävrestad,
Marcus Nohlberg,
Steven Furnell

Abstract: Cybersecurity threats targeting users are common in today's information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data. The common suggestion for addressing this problem is to train users to behave better using SETA programs. The notion of training users is old, and several SETA methods are described in scientific literature. Yet, incidents stemming from insecure user behavior continue to happen and are reported as one of the most common types of incidents. Resear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 112 publications
0
0
0
Order By: Relevance