Published on in Vol 23, No 5 (2021): May

Preprints (earlier versions) of this paper are available at https://preprints.jmir.org/preprint/24879, first published .
Emotional Reactions to Cybersecurity Breach Situations: Scenario-Based Survey Study

Emotional Reactions to Cybersecurity Breach Situations: Scenario-Based Survey Study

Emotional Reactions to Cybersecurity Breach Situations: Scenario-Based Survey Study

Journals

  1. Odeleye B, Loukas G, Heartfield R, Sakellari G, Panaousis E, Spyridonis F. Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments. Computers & Security 2023;124:102951 View
  2. He Y, Zamani E, Yevseyeva I, Luo C. Artificial Intelligence–Based Ethical Hacking for Health Information Systems: Simulation Study. Journal of Medical Internet Research 2023;25:e41748 View
  3. Lee H, Lee K, Lee K, Erdenbayar U, Hwang S, Lee E, Lee J, Kim H, Park S, Park J, Chung T, Kim T, Youk H. Internet of medical things-based real-time digital health service for precision medicine: Empirical studies using MEDBIZ platform. DIGITAL HEALTH 2023;9 View
  4. Huijts N, Haans A, Budimir S, Fontaine J, Loukas G, Bezemskij A, Oostveen A, Filippoupolitis A, Ras I, IJsselsteijn W, Roesch E. User experiences with simulated cyber-physical attacks on smart home IoT. Personal and Ubiquitous Computing 2023;27(6):2243 View
  5. Moghadasi N, Valdez R, Piran M, Moghaddasi N, Linkov I, Polmateer T, Loose D, Lambert J. Risk Analysis of Artificial Intelligence in Medicine with a Multilayer Concept of System Order. Systems 2024;12(2):47 View
  6. Chen J, Wan J, Wu Y, Gan L, Li H, Zhou Y, Liu S, Luo L, Zhou H, Yin X, Chang J. The Association Between Personality Traits and Health-Related Quality of Life and the Mediating Role of Smoking: Nationwide Cross-Sectional Study. JMIR Public Health and Surveillance 2024;10:e51416 View
  7. Pirta-Dreimane R, Brilingaitė A, Roponena E, Parish K, Grabis J, Lugo R, Bonders M. Try to esCAPE from Cybersecurity Incidents! A Technology-Enhanced Educational Approach. Technology, Knowledge and Learning 2025;30(3):1577 View
  8. Borwell J, Jansen J, Stol W. Exploring the impact of cyber and traditional crime victimization: Impact comparisons and explanatory factors. International Review of Victimology 2025;31(1):156 View
  9. Achuthan K, Khobragade S, Kowalski R. Public sentiment and engagement on cybersecurity: Insights from Reddit discussions. Computers in Human Behavior Reports 2025;17:100573 View
  10. Budimir S, Fontaine J, Huijts N, Haans A, IJsselsteijn W, Oostveen A, Stahl F, Heartfield R, Loukas G, Bezemskij A, Filippoupolitis A, Ras I, Roesch E. We Are Not Equipped to Identify the First Signs of Cyber–Physical Attacks: Emotional Reactions to Cybersecurity Breaches on Domestic Internet of Things Devices. Applied Sciences 2024;14(24):11855 View
  11. Xue Y, Wang X, Li Y, Zhong Y. Associations Between Brain Functional Network Characteristics and Musical Creative Achievement. Creativity Research Journal 2025:1 View
  12. Benson V, Di Chiacchio L, Frączek B. Why Soft Skills Matter for Women in Cybersecurity. Journal of Computer Information Systems 2025:1 View

Books/Policy Documents

  1. Pirta-Dreimane R, Brilingaitė A, Roponena E, Parish K, Grabis J, Lugo R, Bonders M. Augmented Cognition. View
  2. Dupuis M, Jones E. Proceedings of Ninth International Congress on Information and Communication Technology. View
  3. Katiyar A, Gaurav A, Gupta B, Jusung M. Critical Phishing Defense Strategies and Digital Asset Protection. View
  4. Tshimula J, Nkashama D, Muabila J, Galekwa R, Kanda H, Dialufuma M, Didier M, Kalonji K, Mundele S, Lenye P, Basele T, Ilunga A, Mayemba C, Kasoro N, Kasereka S, Mikese H, Tardif P, Frappier M, Kabanza F, Wang S, Sumbu A, Ndona X, Intudi R. Web Information Systems Engineering – WISE 2024 PhD Symposium, Demos and Workshops. View
  5. Katkar K, Fernandes M, Prajapati F, Dodiya K, Khunt A, Patel D. Exploiting Machine Learning for Robust Security. View