Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJune 2024
Digital Twins and Extended Reality for Tailoring Better Adapted Cybersecurity Trainings in Critical Infrastructures
- Eloïse Zehnder,
- Leanne Torgersen,
- Torvald F. Ask,
- Benjamin J. Knox,
- Holger Morgenstern,
- Jeroen Gaiser,
- Yannick Naudet,
- Alexeis Garcia Perez,
- Cristoph Stahl
AbstractDue to their value and interconnected role in our societies, critical infrastructures are vulnerable national assets increasingly becoming targets of cyber-attacks. Despite there being a multitude of training programs in cybersecurity offered, ...
- ArticleJuly 2023
Individual Deep Fake Recognition Skills are Affected by Viewer’s Political Orientation, Agreement with Content and Device Used
- Stefan Sütterlin,
- Torvald F. Ask,
- Sophia Mägerle,
- Sandra Glöckler,
- Leandra Wolf,
- Julian Schray,
- Alava Chandi,
- Teodora Bursac,
- Ali Khodabakhsh,
- Benjamin J. Knox,
- Matthew Canham,
- Ricardo G. Lugo
AbstractAI-generated “deep fakes” is increasingly used by cybercriminals conducting targeted and tailored social engineering attacks, and for influencing public opinion. To raise awareness and efficiently train individuals in recognizing deep fakes, ...
- ArticleJune 2022
The Role of IT Background for Metacognitive Accuracy, Confidence and Overestimation of Deep Fake Recognition Skills
- Stefan Sütterlin,
- Ricardo G. Lugo,
- Torvald F. Ask,
- Karl Veng,
- Jonathan Eck,
- Jonas Fritschi,
- Muhammed-Talha Özmen,
- Basil Bärreiter,
- Benjamin J. Knox
AbstractThe emergence of synthetic media such as deep fakes is considered to be a disruptive technology shaping the fight against cybercrime as well as enabling political disinformation. Deep faked material exploits humans’ interpersonal trust and is ...
- ArticleJuly 2021
Human-Human Communication in Cyber Threat Situations: A Systematic Review
HCI International 2021 - Late Breaking Papers: Cognition, Inclusion, Learning, and CulturePages 21–43https://doi.org/10.1007/978-3-030-90328-2_2AbstractIn cyber threat situations, decision-making processes within organizations and between the affected organization and external entities are high-stake. They require human communication entailing technical complexity, time pressure, ...
- ArticleJuly 2021
Situational States Influence on Team Workload Demands in Cyber Defense Exercise
HCI International 2021 - Late Breaking Papers: Cognition, Inclusion, Learning, and CulturePages 3–20https://doi.org/10.1007/978-3-030-90328-2_1AbstractCyber operations are increasingly automated processes that can occur at computational speed with the intent of reducing, or denying time for good decision making or time to ground communication between human agents. There is a lack of performance ...