Listen

Description

Notes:

About our Guest:

Julia Prümmer

https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1

https://www.linkedin.com/in/julia-prümmer-376778159/

Papers or resources mentioned in this episode

 

Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methodsComputers & Security, 136, 103585.

https://doi.org/10.1016/j.cose.2023.103585

Prümmer, J. (2024). The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), Augmented cognition. HCII 2024 (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.

https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101

Prümmer, J., van Steen, T., & van den Berg, B. (2025). Assessing the effect of cybersecurity training on end-users: A meta-analysisComputers & Security, 150, 104206.

https://doi.org/10.1016/j.cose.2024.104206

Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attackJournal of Computer-Mediated Communication, 20(5), 570–584.

https://doi.org/10.1111/jcc4.12126

Other

 

If this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.