{"id":334,"date":"2025-08-01T00:11:26","date_gmt":"2025-08-01T00:11:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rlee\/?p=334"},"modified":"2025-08-01T00:11:26","modified_gmt":"2025-08-01T00:11:26","slug":"annotated-bibliography","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rlee\/2025\/08\/01\/annotated-bibliography\/","title":{"rendered":"Annotated Bibliography"},"content":{"rendered":"Annotated Bibliography<br \/>Ramon Lee<br \/>Old Dominion University<br \/>CYSE 201S: Cybersecurity, Technology, and Society<br \/>Dr. Matthew Umphlet<br \/>June 28, 2025<br \/>Smith, A., Lee, B., &amp; Patel, C. (2023). Understanding user behavior for enhancing<br \/>cybersecurity training: An XR-based framework for user behavior analysis in critical<br \/>infrastructure settings. *Information, 15*(12), 814. https:\/\/doi.org\/10.3390\/info15120814<br \/>This peer-reviewed article introduces an XR-based cybersecurity training framework<br \/>designed to analyze real-time user behavior during simulated cyber-attacks in critical<br \/>infrastructure environments. Through gamification and data collection modules, the study<br \/>provides insights into how users respond under pressure.<br \/>It is methodologically sound, published in a scholarly journal (*Information*), and uses a<br \/>detailed case study of a water treatment facility to test its system. This makes it reliable,<br \/>practical, and academically strong.<br \/>This source contributes to my research by showing how immersive simulations enhance<br \/>behavioral preparedness, supporting my argument that experiential learning is vital for<br \/>cybersecurity training.<br \/>Khadka, K., &amp; Ullah, A. B. (2025). Human factors in cybersecurity: An interdisciplinary<br \/>review and framework proposal. *International Journal of Information Security and<br \/>Privacy.* https:\/\/doi.org\/10.1007\/s10207-025-01032-0<br \/>This article reviews how human psychology and social behaviors impact cybersecurity.<br \/>The authors propose the Human-Centric Cybersecurity Framework (HCCF), which<br \/>incorporates adaptive communication, ethical AI, and inclusivity into security strategies.<br \/>The journal is peer-reviewed and interdisciplinary. The authors draw from psychology,<br \/>sociology, and policy to build a credible and applicable model. The article clearly fills a<br \/>gap in literature on human-centered design.<br \/>This source is useful to my review because it emphasizes the need to integrate human<br \/>behavior into cybersecurity, and gives me a framework to support my claim for more<br \/>inclusive, socially informed defense strategies.<br \/>Mulahuwaish, A., Qolomany, B., Gyorick, K., Bou Abdo, J., Aledhari, M., Qadir, J., &amp;<br \/>Carley, K. (2025). A survey of social cybersecurity: Techniques for attack detection,<br \/>evaluations, challenges, and future prospects. *Computers in Human Behavior Reports,<br \/>18*, 100668. https:\/\/doi.org\/10.1016\/j.chbr.2025.100668<br \/>This survey article explores social cybersecurity, a growing field that studies digital<br \/>manipulation like bots, deepfakes, and disinformation. It reviews detection tools and<br \/>outlines future challenges in evaluating these threats across platforms.<br \/>As a recent, peer-reviewed article from *Computers in Human Behavior Reports*, the<br \/>survey is scholarly and up-to-date. It is especially strong in its breakdown of current<br \/>detection models and its proposed research directions.<br \/>I will use this to support my argument that cybersecurity must include sociotechnical<br \/>threats, and that protecting users from manipulation is just as important as protecting<br \/>systems from hacking.<br \/>Almansoori, A., Al-Emran, M., &amp; Shaalan, K. (2023). Exploring the frontiers of<br \/>cybersecurity behavior: A systematic review of studies and theories. *Applied Sciences,<br \/>13*(9), 5700. https:\/\/doi.org\/10.3390\/app13095700<br \/>This systematic review evaluates 39 studies on cybersecurity behavior and identifies that<br \/>most rely on Protection Motivation Theory (PMT). The authors argue for new models<br \/>that include group behavior, organizational settings, and cultural context.<br \/>The article is scholarly, published in *Applied Sciences*, and uses a clear methodology<br \/>to identify gaps in behavioral cybersecurity research.<br \/>This article helps me show that the field needs broader frameworks and supports my plan<br \/>to recommend policy and training that considers team and cultural factors","protected":false},"excerpt":{"rendered":"<p>Annotated BibliographyRamon LeeOld Dominion UniversityCYSE 201S: Cybersecurity, Technology, and SocietyDr. Matthew UmphletJune 28, 2025Smith, A., Lee, B., &amp; Patel, C. (2023). Understanding user behavior for enhancingcybersecurity training: An XR-based framework for user behavior analysis in criticalinfrastructure settings. *Information, 15*(12), 814. https:\/\/doi.org\/10.3390\/info15120814This peer-reviewed article introduces an XR-based cybersecurity training frameworkdesigned to analyze real-time user behavior during&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/rlee\/2025\/08\/01\/annotated-bibliography\/\">Read More<\/a><\/div>\n","protected":false},"author":30933,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":4},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/users\/30933"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/posts\/334\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rlee\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}