
Sign up to save your podcasts
Or


Julia Prümmer
https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1
https://www.linkedin.com/in/julia-prümmer-376778159/
Papers or resources mentioned in this episodePrümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585.
https://doi.org/10.1016/j.cose.2023.103585
Prümmer, J. (2024). The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), Augmented cognition. HCII 2024 (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.
https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101
Prümmer, J., van Steen, T., & van den Berg, B. (2025). Assessing the effect of cybersecurity training on end-users: A meta-analysis. Computers & Security, 150, 104206.
https://doi.org/10.1016/j.cose.2024.104206
Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570–584.
https://doi.org/10.1111/jcc4.12126
OtherIf this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.
By Cybercrimeology3.7
33 ratings
Julia Prümmer
https://www.universiteitleiden.nl/medewerkers/julia-prummer#tab-1
https://www.linkedin.com/in/julia-prümmer-376778159/
Papers or resources mentioned in this episodePrümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585.
https://doi.org/10.1016/j.cose.2023.103585
Prümmer, J. (2024). The role of cognition in developing successful cybersecurity training programs: Passive vs. active engagement. In D. D. Schmorrow & C. M. Fidopiastis (Eds.), Augmented cognition. HCII 2024 (Lecture Notes in Computer Science, Vol. 14695, pp. 185–199). Springer.
https://scholarlypublications.universiteitleiden.nl/handle/1887/4093101
Prümmer, J., van Steen, T., & van den Berg, B. (2025). Assessing the effect of cybersecurity training on end-users: A meta-analysis. Computers & Security, 150, 104206.
https://doi.org/10.1016/j.cose.2024.104206
Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570–584.
https://doi.org/10.1111/jcc4.12126
OtherIf this topic of training as an intervention to reduce susceptibility to cybercrime, you might also enjoy the recent Episodes 123, 116, 110, 106, 60, and 59 that are all on related topics. If you are brave you can even go right back to Episodes 6, 7 and 8, there is a lot to listen to.