Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? International Conference on Cyber Security for Sustainable Society. https://doi.org/10.48550/arXiv.1901.02672
Braun, Oskar & Hörnemann, Jan & Pohlmann, Norbert & Urban, Tobias & Große-Kampmann, Matteo. (2025). Different Seas, Different Phishes -Large-Scale Analysis of Phishing Simulations Across Different Industries. 10.1145/3708821.3733905.
Covello, V. T. (2022). The critical role of risk, high concern, and crisis communication. In Risk communication (pp. 1–9). https://doi.org/10.1002/9781119081753.ch1
Crossler, R. E., & Bélanger, F. (2014). An extended perspective on individual security behaviors. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 45(4), 51–71. https://doi.org/10.1145/2691517.2691521
Dechand, S., Naiakshina, A., Danilova, A., & Smith, M. (2019). In encryption we don’t trust: The effect of end-to-end encryption to the masses on user perception. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 401–415). https://doi.org/10.1109/EuroSP.2019.00037
Dodge, C. E., Fisk, N., Burruss, G. W., Moule, R. K., & Jaynes, C. M. (2023). What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory. Criminology & Public Policy, 22(4), 849–868. https://doi.org/10.1111/1745-9133.12641
Eriksson, M. (2024). A multi-motive risk communication model for “making” crisis preparedness. In Risk and crisis communication in Europe: Towards integrating theory and practice in unstable and turbulent times (2024).
Florêncio, D., Herley, C., & Shostack, A. (2014). FUD: A plea for intolerance. Communications of the ACM, 57(6), 31–33. https://doi.org/10.1145/2602323
Fulton, K. R., Gelles, R., McKay, A., Abdi, Y., Roberts, R., & Mazurek, M. L. (2019). The effect of entertainment media on mental models of computer security. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (pp. 79–95). USENIX Association. https://www.usenix.org/conference/soups2019/presentation/fulton
Menges, U., Hielscher, J., Kocksch, L., Kluge, A., & Sasse, M. A. (2023). Caring not scaring: An evaluation of a workshop to train apprentices as security champions. In Proceedings of the 2023 European Symposium on Usable Security (EuroUSEC ’23) (pp. 237–252). Association for Computing Machinery. https://doi.org/10.1145/3617072.3617099
Nurse, J. R. C., Creese, S., Goldsmith, M., & Lamberts, K. (2011). Trustworthy and effective communication of cybersecurity risks: A review. In 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST) (pp. 60–68). IEEE. doi.org/10.1109/STAST.2011.6059251
Reeder, R. W., Ion, I., & Consolvo, S. (2017). 152 simple steps to stay safe online: Security advice for non-tech-savvy users. IEEE Security & Privacy, 15(5), 55–64. https://doi.org/10.1109/MSP.2017.3481061
Sasse, M. A., Hielscher, J., Friedauer, J., & Buckmann, A. (2023). Rebooting IT security awareness: How organisations can encourage and sustain secure behaviours. In M. Meier & D. Reinhardt (Eds.), Mensch und Computer 2023 (pp. 265–284). Springer. doi.org/10.1007/978-3-031-25460-4_14