International Publishing. https://doi.org/10.1007/978-
3-030-52581-1_4
Følstad, A., & Kvale, K. (2018). Customer journeys: A
systematic literature review. Journal of Service Theory
and Practice, 28(2), 196–227. https://doi.org/
10.1108/JSTP-11-2014-0261
Ghafir, Saleem, J., Hammoudeh, M., Faour, H., Prenosil,
V., Jaf, S., Jabbar, S., & Baker, T. (2018). Security
threats to critical infrastructure: the human factor. The
Journal of Supercomputing, 74(10), 4986–5002.
https://doi.org/10.1007/s11227-018-2337-2
Halvorsrud, R., Boletsis, C., & Garcia-Ceja, E. (2021).
Designing a modeling language for customer journeys:
Lessons learned from user involvement. 2021
ACM/IEEE 24th International Conference on Model
Driven Engineering Languages and Systems
(MODELS) (pp. 239–249). Institute of Electrical and
Electronics Engineers. https://hdl.handle.net/11250/
3014760
Halvorsrud, R., Haugstveit, I. M., & Pultier, A. (2016).
Evaluation of a modelling language for customer
journeys. In 2016 IEEE Symposium on Visual
Languages and Human-Centric Computing (VL/HCC),
(pp. 40–48). https://doi.org/10.1109/VLHCC.2016.
7739662
Kullman, K., Buchanan, L., Komlodi, A., & Engel, D.
(2020). Mental model mapping method for
cybersecurity. In Human-Computer Interaction for
Cybersecurity, Privacy and Trust (Vol. 12210, pp. 458–
470). Springer International Publishing. https://
doi.org/10.1007/978-3-030-50309-3_30
Larsen, L. B., Øvad, T., Nielsen, L., & Larusdottir, M.
(2021). Remote user testing: Experiences and trends. In
Human-Computer Interaction – INTERACT 2021 (Vol.
12936, pp. 579–583). Springer International Publishing.
https://doi.org/10.1007/978-3-030-85607-6_81
Lund, M. S., Solhaug, B., & Stølen, K. (2011). Model-
driven risk analysis: The CORAS approach. Springer.
Meshkat, L., Miller, R. L., Hillsgrove, C., & King, J. (2020).
Behavior modeling for cybersecurity. In 2020 Annual
Reliability and Maintainability Symposium (RAMS) (pp.
1–7). Institute of Electrical and Electronics Engineers.
https://doi.org/10.1109/RAMS48030.2020.9153685
Meszaros, J., & Buchalcevova, A. (2017). Introducing
OSSF: A framework for online service cybersecurity
risk management. Computers & Security, 65, 300–313.
https://doi.org/10.1016/j.cose.2016.12.008
Paulsen, C. (2016). Cybersecuring Small Businesses.
Computer, 49(8), 92–97. https://doi.org/10.1109/
MC.2016.223
Ponsard, C., & Grandclaudon, J. (2020). Guidelines and
tool support for building a cybersecurity awareness
program for SMEs. In Communications in Computer
and Information Science (Vol. 1221, pp. 335–357).
Springer International Publishing. https://doi.org/
10.1007/978-3-030-49443-8_16
Shackel, B. (2009). Usability – Context, framework,
definition, design and evaluation. Interacting with
Computers, 21(5–6), 339–346. https://doi.org/10.1016/
j.intcom.2009.04.007
Sharma, T., & Bashir, M. (2020). An analysis of phishing
emails and how the human vulnerabilities are exploited.
In Advances in Human Factors in Cybersecurity (Vol.
1219, pp. 49–55). Springer International Publishing.
https://doi.org/10.1007/978-3-030-52581-1_7
Symantec. (2019). Symantec 2019 internet security threat
report. https://docs.broadcom.com/doc/istr-24-2019- en
Tax, S. S., McCutcheon, D., & Wilkinson, I. F. (2013). The
service delivery network (SDN): A customer-centric
perspective of the customer journey. Journal of Service
Research, 16(4), 454–470. https://doi.org/10.1177/
1094670513481108
The National Center for the Middle Market. (2016).
Cybersecurity and the middle market: The importance of
cybersecurity and how middle market companies
manage cyber risks. https://www.middlemarketcenter.
org/Media/Documents/the-growing-importance-of-
cybersecurity-and-how-middle-market-companies-
manage-cyber-risks_NCMM_Cybersecurity_FINAL.pdf
Tsohou, A., Karyda, M., Kokolakis, S., & Kiountouzis, E.
(2010). Analyzing Information Security Awareness
through Networks of Association. In S. Katsikas, J.
Lopez, & M. Soriano (Eds.), Trust, Privacy and
Security in Digital Business (pp. 227–237). Springer.
https://doi.org/10.1007/978-3-642-15152-1_20
Tueanrat, Y., Papagiannidis, S., & Alamanos, E. (2021).
Going on a journey: A review of the customer journey
literature. Journal of Business Research, 125, 336–353.
https://doi.org/10.1016/j.jbusres.2020.12.028
Vakakis, N., Nikolis, O., Ioannidis, D., Votis, K., &
Tzovaras, D. (2019). Cybersecurity in SMEs: The
smart-home/office use case. 2019 IEEE 24th
International Workshop on Computer Aided Modeling
and Design of Communication Links and Networks
(CAMAD) (pp. 1–7). https://doi.org/10.1109/CAMAD.
2019.8858471
Verizon Business. (2022). 2022 Data Breach Investigations
Report. Retrieved September 19, 2022, from https://
www.verizon.com/business/resources/reports/dbir/
Wever, R., van Kuijk, J., & Boks, C. (2008). User‐centred
design for sustainable behaviour. International Journal
of Sustainable Engineering, 1(1), 9–20. https://
doi.org/10.1080/19397030802166205