<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="review-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Comput. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Computer Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Comput. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2624-9898</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fcomp.2026.1764808</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Review</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Annoyed by cybersecurity? Human-centric perspectives on cybersecurity</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Kour</surname>
<given-names>Ravdeep</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2744019"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Karim</surname>
<given-names>Ramin</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2432372"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>W&#x00E4;genbauer</surname>
<given-names>Annika</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3393829"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>Division of Operation and Maintenance Engineering, Lulea University of Technology</institution>, <city>Lule&#x00E5;</city>, <country country="se">Sweden</country></aff>
<aff id="aff2"><label>2</label><institution>Cybersecurity Redefined</institution>, <city>Stuttgart</city>, <country country="de">Germany</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Ravdeep Kour, <email xlink:href="mailto:ravdeep.kour@ltu.se">ravdeep.kour@ltu.se</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-02-26">
<day>26</day>
<month>02</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>8</volume>
<elocation-id>1764808</elocation-id>
<history>
<date date-type="received">
<day>10</day>
<month>12</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>05</day>
<month>02</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>11</day>
<month>02</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Kour, Karim and W&#x00E4;genbauer.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Kour, Karim and W&#x00E4;genbauer</copyright-holder>
<license>
<ali:license_ref start_date="2026-02-26">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>Humans play a vital role in designing, developing, implementing, and using technical systems. For this reason, it is crucial to keep humans in the loop at each phase of these systems to make them more secure and user-friendly. There needs to be a balance between using these systems securely and making them easy to use. Today, under pressure to secure our systems from cyberattacks, we primarily focus on making them secure but often overlook making them easy to use. Thus, the objective of this paper is to provide a human-centric perspective on cybersecurity and to introduce a human-centric framework that enables Industry 5.0, where humans have direct interaction with systems and solutions that are more customer-oriented. To carry out this research, the authors have applied the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to investigate human-centric research over a 10-year period, from 2015 to 2025. The literature shows that most human-centric research contributions are well-balanced, with conceptual, experimental, and survey approaches each accounting for approximately 64% of the total, indicating a mature blend of theoretical and applied research. These studies are focused on developing structured, strategic approaches that integrate human factors into cybersecurity practices across sectors such as education, government, health, software, smart home networks, and others. To conduct this research, the authors have prepared an anonymous questionnaire with fundamental questions about secure system&#x2019;s design, which can be easily used. The evaluation results show that frequent password resets (33.3%) and frequent authentication (26.7%) are the most &#x201C;annoying&#x201D; cybersecurity measures. Additionally, most respondents consider biometric login the most user-friendly security feature, followed by single sign-on and automatic security patch updates. What is missing in existing literature and studies is a holistic perspective on human-centrism, beyond mere ease of use. We aim to cover that blind spot by introducing our independently developed framework in this paper.</p>
</abstract>
<kwd-group>
<kwd>annoyance</kwd>
<kwd>cybersecurity</kwd>
<kwd>framework</kwd>
<kwd>human-centric</kwd>
<kwd>review</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was received for this work and/or its publication. This work has been carried out within the framework, &#x201C;AI Factory&#x201D; at LTU.</funding-statement>
</funding-group>
<counts>
<fig-count count="8"/>
<table-count count="8"/>
<equation-count count="0"/>
<ref-count count="66"/>
<page-count count="18"/>
<word-count count="11889"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Computer Security</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>Cybersecurity plays a crucial role in the digital era. Sometimes, it seems that excessive cybersecurity is a hindrance to end users. Instead of following cybersecurity measures because of their annoyance, users opt for easy alternatives that can lead to system vulnerabilities. Based on a survey, the most reflected annoyances related to cybersecurity were frequent password changes (21.6%) and multiple authentication steps (<xref ref-type="bibr" rid="ref23">Hadi, 2023</xref>). This leads to a high cognitive cost, which refers to the mental effort users put in while dealing with security measures that can lead to security fatigue and mistakes (<xref ref-type="bibr" rid="ref23">Hadi, 2023</xref>). Additionally, researchers have mentioned some of the factors that many employees fail to follow, such as inconvenience (MFA, complex password requirements, or software updates), lack of awareness (clicking on a malicious link or weak password), and complacency and overconfidence (<xref ref-type="bibr" rid="ref4">Ayodele et al., 2025</xref>).</p>
<p>Thus, we must strike a balance between providing cyber-secure systems and their ease of usability. This usability factor can be incorporated when we think from the perspective of end users, and we need to understand their psychology. The literature reveals a lack of empirical research on the use of psychology in cybersecurity. To address this, we need to consider humans as a central part of cybersecurity, moving toward a human-centric perspective rather than a technology-centric one (<xref ref-type="bibr" rid="ref24">Hakimi et al., 2024</xref>).</p>
<p>Researchers are talking about the current systems where security is added at the expense of usability, and there is a need for a balance between cybersecurity and usability (<xref ref-type="bibr" rid="ref64">van der Kleij et al., 2024</xref>). Some of the researchers have proposed human-centric cybersecurity by integrating user, usage, and usability (the 3Us) into security design, implementation, and deployment (<xref ref-type="bibr" rid="ref22">Grobler et al., 2021</xref>). Other researchers are considering user, system, and usability as the three pillars of cybersecurity from a Computer Science community perspective (<xref ref-type="bibr" rid="ref51">Rahman et al., 2021</xref>). They have explored human-centric cybersecurity (HC-CS), considering not only technical users such as software developers, security professionals, and code testers, but also regular users who use the system (<xref ref-type="bibr" rid="ref51">Rahman et al., 2021</xref>). There is no standard definition of HC-CS in the literature, and the term is used somewhat vaguely. <xref ref-type="table" rid="tab1">Table 1</xref> summarises definitions of HC-CS found in the literature. Most researchers observe that HC-CS is inherently difficult to define due to the complex interconnections among humans, technology, and security systems.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Definitions of human-centric cybersecurity as provided in the literature.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Papers</th>
<th align="left" valign="top">Definition of human-centric cybersecurity</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref42">Mohammed (2025)</xref>
</td>
<td align="left" valign="top">&#x201C;Shifts the focus from purely technical solutions to <italic>an integrated approach</italic> that considers human behavior, motivations, and cognitive patterns.&#x201D;</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref34">Khadka and Ullah (2025)</xref>
</td>
<td align="left" valign="top">A <italic>holistic framework</italic> that integrates psychological, educational, organisational, and socio-technical dimensions to align human factors with technology and strategies, enhancing cybersecurity resilience.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref34">Khadka and Ullah (2025)</xref>
</td>
<td align="left" valign="top">An <italic>approach</italic> that goes beyond technical solutions by focusing on human behaviour, vulnerabilities, training, and organisational culture to enhance cybersecurity and reduce risks.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref18">Gavaza and Katsande (2023)</xref>
</td>
<td align="left" valign="top">&#x201C;A <italic>collection of the necessary knowledge and skills</italic> required to create a capable workforce that can provide security safeguards, and develop, implement and enforce policies, standard operating procedures, tools, technologies and guidelines for best practices.&#x201D;</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref52">Rao (2024)</xref>
</td>
<td align="left" valign="top">An <italic>emerging paradigm</italic> that seeks to safeguard individual rights and freedom in cyberspace.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref22">Grobler et al. (2021)</xref>
</td>
<td align="left" valign="top"><italic>Intangible concept</italic>, involving all aspects of cyber security, with a particular focus on the human involvement, where humans represent both value and risk to an organisation. The focus is on the user, usage, and usability.</td>
</tr>
<tr>
<td align="left" valign="top"><xref ref-type="bibr" rid="ref51">Rahman et al. (2021)</xref> and <xref ref-type="bibr" rid="ref54">Rohan et al. (2021)</xref></td>
<td align="left" valign="top">A <italic>vague concept</italic> based on the Computer Science (CS) community&#x2019;s perspective of human factors, focusing on human involvement in processes and systems, their role, value, risks, and influence on cybersecurity goals. The focus is on user, system, and usability.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref54">Rohan et al. (2021)</xref>
</td>
<td align="left" valign="top">A <italic>complicated concept</italic> that encompasses consumer electronics (CE) and consumer technology (CT) is challenging to define due to the inherent relationships between humans and technology. The focus is on user, system, and usability.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref13">Deibert (2018)</xref>
</td>
<td align="left" valign="top">An <italic>emerging approach</italic> that prioritises human rights (such as access to information, freedom of thought, and freedom of association) over traditional security-centric models.</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="sec2">
<label>1.1</label>
<title>Human-centric cybersecurity and people, process, and technology framework</title>
<p>The concepts used in the definitions provided in <xref ref-type="table" rid="tab1">Table 1</xref> resemble a popular framework called People, Process, and Technology (PPT), introduced by <xref ref-type="bibr" rid="ref39">Leavitt (1964)</xref> and restructured by <xref ref-type="bibr" rid="ref58">Schneier (2015)</xref> in the context of IT security, as presented in <xref ref-type="fig" rid="fig1">Figure 1</xref>. Each element of the PPT framework is briefly discussed:</p>
<list list-type="bullet">
<list-item>
<p>Technologies provide essential security measures, including firewalls, encryption, biometrics, password protection, and intrusion detection.</p>
</list-item>
<list-item>
<p>Processes such as risk assessments, incident response, vulnerability management, identity and authentication management, and access control management ensure effective management and control.</p>
</list-item>
<list-item>
<p>Both technologies and processes depend on people, including administrators, managers, software developers, security professionals, code testers, and end-users, whose training and awareness are critical to make them the &#x201C;strongest link&#x201D; from the &#x201C;weakest link&#x201D; referred to in most of the literature.</p>
</list-item>
</list>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>People, process, and technology framework.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Venn diagram with three overlapping circles labeled People, Process, and Technology. Each circle contains a relevant icon: people figures for People, a box with arrows for Process, and a robotic arm for Technology.</alt-text>
</graphic>
</fig>
<p>Thus, to redefine human-centric cybersecurity in the context of the PPT framework is:</p>
<disp-quote>
<p>&#x201C;<italic>An approach that integrates people, processes, and technology by prioritising usability and human behaviour, ensuring humans are skilled and informed, processes are clear and adaptable, and technologies support real human needs, creating resilient and sustainable security</italic>.&#x201D;</p>
</disp-quote>
<p>This definition also aligns with the context of Industry 5.0, &#x201C;Toward a Sustainable, Human-centric, and Resilient European Industry,&#x201D; encouraging industries to reassess their positions and roles in society (<xref ref-type="bibr" rid="ref7">Breque et al., 2021</xref>). In order to attain this position and role in society, we need trained and well-aware humans on both sides (developers of the system and users of the system). Thus, making a need for a well-defined training program that is both human-centric and user-friendly. Such training initiatives have been implemented by regional universities, where 82% of over 2,000 employees completed the program, with more than half of the units achieving 100% completion, and 91% of faculty participating (<xref ref-type="bibr" rid="ref11">Coffey et al., 2018</xref>). We need such initiatives at both academic and industrial levels. Cybersecurity has become so vital in our daily lives that it needs to be introduced in elementary schools with basic knowledge to benefit the entire society. If society as a whole is not well-informed and trained, it can be vulnerable to cyberattacks. <italic>Researchers have discussed the following factors that influence humans&#x2019; vulnerability to cyberattacks</italic> (<xref ref-type="bibr" rid="ref45">Morgan et al., 2020</xref>):</p>
<list list-type="bullet">
<list-item>
<p><italic>Cognitive factors</italic>: low awareness, poor perception, limited understanding and knowledge.</p>
</list-item>
<list-item>
<p><italic>Organisational/environmental factors</italic>: weak security culture, work pressure, and stress.</p>
</list-item>
<list-item>
<p><italic>Workload/stress factors</italic>: time pressure, high workload, multitasking, cognitive overload, fatigue, and financial stress.</p>
</list-item>
<list-item>
<p><italic>Decision-making biases</italic>: availability heuristic, framing effect, sunk-cost fallacy, affect (emotion-driven) heuristic, truth-default bias.</p>
</list-item>
<list-item>
<p><italic>Individual differences</italic>: high trust, impulsivity, low self-control/awareness, risk-taking, self-deception, low expertise, strong need for affiliation.</p>
</list-item>
<list-item>
<p><italic>Individual contextual factors</italic>: cognitive overload, time pressure, financial need, fatigue, and other unsafe organisational cultures.</p>
</list-item>
</list>
<p>Other cognitive and psychological aspects of cybersecurity include cognitive biases (such as overconfidence and anchoring bias), risk perception (lack of recognising the severity of cyber threats), and lack of awareness and training (poor cyber hygiene) (<xref ref-type="bibr" rid="ref4">Ayodele et al., 2025</xref>). Therefore, it becomes very important for the organisations to communicate about socio-technical cyber hygiene at workplaces rather than only technical hygiene (<xref ref-type="bibr" rid="ref45">Morgan et al., 2020</xref>).</p>
</sec>
<sec id="sec3">
<label>1.2</label>
<title>Instances of cyberattacks happened due to human error or negligence</title>
<p>Europe is facing an increase in cyberattacks, as its digital and economic strength makes it a prime target for cybercriminals. The UK reported 1.3 million computer misuse cases and a 33% rise in fraud in 2024, while Germany suffered $298 billion in damages from cybercrime, primarily due to data theft and sabotage (<xref ref-type="bibr" rid="ref61">Tamzid, 2025</xref>). France reported a 30% increase in ransomware attacks, with threats originating from Russia and China (<xref ref-type="bibr" rid="ref61">Tamzid, 2025</xref>). With global cybercrime projected to cost $10.5 trillion annually by 2025, robust cybersecurity practices, awareness, and collaboration are crucial for mitigating financial losses, operational disruptions, and reputational damage (<xref ref-type="bibr" rid="ref61">Tamzid, 2025</xref>). Humans play a vital role in promoting cybersecurity hygiene and bridging the gap between technology and users through proper training and awareness, as well as a strong organisational culture. History shows that cyberattacks have been caused by humans (insider threats), with malicious or non-malicious intent. According to MITRE, human-focused insider threat types include (<xref ref-type="bibr" rid="ref16">DTEX, 2025</xref>):</p>
<list list-type="bullet">
<list-item>
<p>Malicious insider: These include insiders who seek to cause harm to the system.</p>
</list-item>
<list-item>
<p>Non-malicious insider: These include negligent insiders (who know but do not care), mistaken insiders (who unintentionally create risk through genuine errors), and outsmarted insiders (who are manipulated by adversaries using novel tactics).</p>
</list-item>
<list-item>
<p>Coerced insider. This is someone who initially has no malicious intent, but neither acts entirely non-maliciously. Instead, it is someone who is pressured, threatened, blackmailed, or otherwise manipulated by a third party into carrying out harmful actions (<xref ref-type="bibr" rid="ref17">Duncan et al., 2012</xref>). The very different types, and the third in particular, demonstrate that psychological factors are highly relevant to both understanding how cyber attacks are carried out and preventing them at the level of human interaction.</p>
</list-item>
</list>
<p>Organisations are increasingly at risk due to employees who lack proper training on security laws, device protection, and data handling. Common issues include sending confidential data to unsecured locations in the cloud, bypassing security policies to simplify tasks, and failing to update systems (<xref ref-type="bibr" rid="ref16">DTEX, 2025</xref>). A global study in 2025 found that &#x201C;insider threat risk&#x201D; costs hit $17.4&#x202F;M, driven by post-incident expenses, with 7,868 incidents (23/org), mostly negligent (55%, caused by employee or contractor negligence/mistakes), and data breaches involving credentials (47%) and PII (47%) (<xref ref-type="bibr" rid="ref16">DTEX, 2025</xref>). From this, we can deduce that people do not follow security policies due to the complexities of using such systems, which exposes organisations to cybersecurity risks. There are several notable instances of cyberattacks that have occurred globally due to human error or negligence. These include:</p>
<list list-type="bullet">
<list-item>
<p><italic>Uber Breaches (2014 and 2016):</italic> Due to cloud credentials exposed on GitHub, Uber suffered a data breach containing sensitive information about the users (<xref ref-type="bibr" rid="ref49">Paljug and Mikac, 2020</xref>).</p>
</list-item>
<list-item>
<p><italic>WannaCry Ransomware Attack (2017):</italic> Due to the negligence of not updating the Microsoft Windows operating system, around 300,000&#x202F;+&#x202F;computers across 150 countries became victims of this ransomware attack, and the ransomware demanded around US$300&#x2013;600 (<xref ref-type="bibr" rid="ref44">Mohurle and Patil, 2017</xref>).</p>
</list-item>
<list-item>
<p><italic>Cash App Data Breach (2021):</italic> A disgruntled ex-employee leaked Cash App&#x2019;s customer data related to 8.2&#x202F;M customers in the USA (<xref ref-type="bibr" rid="ref10">CNN, 2022</xref>). Then again, in 2023, there was an unauthorised access to Cash App data. Customers of this app took the company to court, and it was ordered to pay a $15 million cash settlement (<xref ref-type="bibr" rid="ref57">Salinas, 2025</xref>).</p>
</list-item>
<list-item>
<p><italic>Colonial Pipeline Ransomware Attack (2021):</italic> Due to negligence, such as unpatched and outdated systems, a leaked password led to the attack. After a hacker group obtained this password from the dark web, they directly accessed the network, as there was no two-factor authentication in place, which led to fuel delivery disruptions and panic buying across the United States (<xref ref-type="bibr" rid="ref5">Beerman et al., 2023</xref>).</p>
</list-item>
<list-item>
<p><italic>Tesla (2023):</italic> Due to negligence in revoking employees&#x2019; access permission, two former employees of Tesla shared the confidential data with a German newspaper, affecting 75,735 people (Eva <xref ref-type="bibr" rid="ref55">Rothenberg, 2023</xref>).</p>
</list-item>
<list-item>
<p><italic>AI deepfake Attack (2024):</italic> In 2024, UK design and engineering company Arup, which is behind world-famous buildings such as the Sydney Opera House, was the target of an AI deepfake scam in which one of the employees sent $25 million to criminals based on a video call with a senior management member (<xref ref-type="bibr" rid="ref40">Magramo, 2024</xref>).</p>
</list-item>
<list-item>
<p><italic>Louvre incident (2025)</italic>: In October 2025, thieves managed to steal eight pieces of French crown jewels from the Louvre Museum. Investigators revealed that the museum&#x2019;s internal video surveillance system was protected by the password &#x201C;Louvre.&#x201D; A confidential audit by France&#x2019;s National Cybersecurity Agency (ANSSI) already warned in 2014 that weak passwords and outdated systems created &#x201C;serious shortcomings&#x201D; in the museum&#x2019;s security (Bryony <xref ref-type="bibr" rid="ref20">Gooch, 2025</xref>).</p>
</list-item>
</list>
<p>To address the aim of this study and provide a structured human-centric perspective on cybersecurity, this paper is guided by the following three Research Questions (RQ). These questions align with the adopted PRISMA-based methodology, the analysis of existing literature, and the evaluation of user perceptions of cybersecurity measures, with a particular focus on balancing security and ease of use.</p>
<list list-type="bullet">
<list-item>
<p>RQ1: What trends exist in human-centric cybersecurity research from the last decade, i.e., from 2015 to 2025?</p>
</list-item>
<list-item>
<p>RQ2: How do users experience and perceive cybersecurity measures in their daily digital lives, particularly in terms of usability and security?</p>
</list-item>
<list-item>
<p>RQ3: How can the integration of Industry 5.0 principles and the adoption of a triangle of People, Processes, and Technology support human-centric, resilient, and sustainable cybersecurity?</p>
</list-item>
</list>
<p>The remainder of this paper is organised as follows. Section 2 outlines the research methodology, specifically the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) framework, which was selected for this review. Section 3 presents the results, including trends in human-centric research and the introduction of the human-centric cybersecurity framework as well as results from an online survey, providing an overview of how people experience and perceive cybersecurity in their daily digital lives, with a focus on the balance between security and ease of use. Section 4 presents a summary and observations, while Section 5 explores future directions, and Section 6 concludes the study.</p>
</sec>
</sec>
<sec id="sec4">
<label>2</label>
<title>Research methodology</title>
<p>This study followed Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology (<xref ref-type="bibr" rid="ref43">Moher et al., 2009</xref>) for a transparent and unbiased systematic review. <xref ref-type="fig" rid="fig2">Figure 2</xref> illustrates the literature review process conducted following the PRISMA framework. The PRISMA approach includes several key components: defining eligibility criteria, identifying information sources, executing the search process, selecting relevant studies, and collecting and analysing data to present the results.</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Research methodology based on PRISMA.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g002.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Flowchart illustrating the article selection process for a review from 2015 to 2025. It shows database sources, duplicate removal, exclusion criteria, and final inclusion of forty-four studies after systematic screening steps.</alt-text>
</graphic>
</fig>
<sec id="sec5">
<label>2.1</label>
<title>Eligibility criteria</title>
<p>Articles considered for this paper must meet the following inclusion and exclusion criteria see <xref ref-type="table" rid="tab2">Table 2</xref>.</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Inclusion and exclusion criteria for the current study.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Inclusion criteria</th>
<th align="left" valign="top">Exclusion criteria</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">
<list list-type="bullet">
<list-item>
<p>Studies published within a decade (i.e., 2015&#x2013;2025).</p>
</list-item>
<list-item>
<p>Accessibility of the complete manuscript through Google Scholar and Scopus</p>
</list-item>
<list-item>
<p>Study type includes, e.g., peer-reviewed journal articles, conference papers, theses, and systematic reviews.</p>
</list-item>
<list-item>
<p>Studies published in English.</p>
</list-item>
<list-item>
<p>Studies focusing on human-centric and user-friendly cybersecurity.</p>
</list-item>
</list>
</td>
<td align="left" valign="top">
<list list-type="bullet">
<list-item>
<p>Studies published outside the selected date range (i.e., 2015&#x2013;2025).</p>
</list-item>
<list-item>
<p>Irrelevant study types, such as editorials, commentaries, and letters to the editor.</p>
</list-item>
<list-item>
<p>Unpublished manuscripts and non-peer-reviewed sources.</p>
</list-item>
<list-item>
<p>Language restrictions, such as studies not published in the English language.</p>
</list-item>
<list-item>
<p>Studies not focusing on human-centric and user-friendly cybersecurity.</p>
</list-item>
</list>
</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec6">
<label>2.2</label>
<title>Information sources</title>
<p>To identify relevant literature on human-centric cybersecurity, the authors conducted searches across four databases: Google Scholar, Scopus, Web of Science, and IEEE Xplore, with most of the relevant studies found in Google Scholar.</p>
</sec>
<sec id="sec7">
<label>2.3</label>
<title>Search strategy</title>
<p>To determine the initial scope of human-centric cybersecurity, the authors conducted a web-based search using prominent academic databases as mentioned above.</p>
<p>The search query/string applied for the titles of the paper is: (&#x201C;user-friendly security&#x201D;) OR (&#x201C;user-friendly cybersecurity&#x201D;) OR (&#x201C;human-centric cybersecurity&#x201D;) OR (&#x201C;human-centric security&#x201D;).</p>
</sec>
<sec id="sec8">
<label>2.4</label>
<title>Study selection</title>
<p>This review paper focuses on the domain of human-centric cybersecurity. All identified literature was consolidated to remove duplicate entries, resulting in a final selection of 44 papers based on predefined eligibility criteria (See <xref ref-type="table" rid="tab2">Table 2</xref>) and relevance. These papers were then thoroughly analysed with particular attention to the tools, technologies, methodologies, and application sectors discussed within them.</p>
<p>The focus is, thereby, not solely on the substantive content or explanatory depth of previous papers and studies. The act of mentioning and discussing is itself treated as an empirical and theoretical phenomenon. Specifically, the review treats descriptions and mentions in literature as objects of analysis in their own right, examined initially independent of their contextual and interpretive meanings. By foregrounding how concepts are repeated or positioned across papers, the review aims to hint at and, finally, reveal structural patterns, implicit assumptions and, ultimately, reveal silences in the field. This perspective allows us to, in future studies, fill gaps as to what &#x201C;annoying cybersecurity&#x201D; actually means and, ultimately, find out how to prevent it from being perceived as such. In essence, we presume human-centric cybersecurity to be the exact opposite of annoying cybersecurity (<xref ref-type="table" rid="tab3">Tables 3</xref>&#x2013;<xref ref-type="table" rid="tab7">7</xref>).</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>Summary of observations of papers based on frameworks and policies.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Paper</th>
<th align="left" valign="top">Methodology</th>
<th align="left" valign="top">Sector</th>
<th align="left" valign="top">Tools/technologies/models/standards/frameworks</th>
<th align="left" valign="top">Outcome</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" char="&#x00D7;">
<xref ref-type="bibr" rid="ref1">Abdallah et al. (2025)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Game theory and attack graphs</td>
<td align="left" valign="top">This paper introduces a proactive security framework for analysing security decision-making in interdependent systems, utilising attack graphs to capture the impact of selfish and malicious defenders.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref42">Mohammed (2025)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Organisational settings</td>
<td align="left" valign="top">UEBA (User and Entity Behavior Analytics)</td>
<td align="left" valign="top">This book chapter emphases that integrating behavior analytics and machine learning with human-centric cybersecurity policies enhances proactive insider threat detection and brings a culture of trust and awareness within an organisation.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref62">Tari and Mahmud (2025)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Multi-modal data fusion and a rules-based taxonomy and machine learning</td>
<td align="left" valign="top">This paper presents an analytical system that integrates multimodal data (such as user activity logs and behavioural indicators) with a rules-based taxonomy, improving cybersecurity measures by 11.25% while increasing user acceptance by 15.22%, offering a robust and human-centric security framework.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref66">Zhou and Wang (2025)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Maritime</td>
<td align="left" valign="top">AI/ML models</td>
<td align="left" valign="top">This paper introduces a novel and adaptive cybersecurity framework explicitly designed for the maritime domain, addressing human factors.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref56">Ryan (2025)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Government</td>
<td align="left" valign="top">Cryptography</td>
<td align="left" valign="top">This paper discusses the security protocols, especially in voting systems that must be designed with human usability in mind, balancing simplicity and trust by applying the KISS (Keep It Simple, Stupid) principle.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref63">Troublefield (2025)</xref>
</td>
<td align="left" valign="top">Surveys and interviews</td>
<td align="left" valign="top">SMEs</td>
<td align="left" valign="top">Statistical and thematic analysis</td>
<td align="left" valign="top">This paper reveals strong correlations between psychological and organisational factors influencing cybersecurity in SMEs, showing that self-efficacy, positive attitudes, and social norms significantly enhance compliance. In contrast, policy complexity, communication gaps, and resource constraints reduce cybersecurity effectiveness.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref37">Kurdi et al. (2024)</xref>
</td>
<td align="left" valign="top">Survey</td>
<td align="left" valign="top">Software</td>
<td align="left" valign="top">Software development life-cycle (SDLC)</td>
<td align="left" valign="top">This paper highlights the necessity of enhancing security awareness among all members of software development teams from the early stages of the SDLC to strengthen both software quality and security.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref2">Al Ansari et al. (2024)</xref>
</td>
<td align="left" valign="top">Review</td>
<td align="left" valign="top">AI system and PRISMA method</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper promotes for a human-centred design approach to AI systems, enabling easy use while maintaining data privacy and security.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref48">Ozkan Ozen et al. (2024)</xref>
</td>
<td align="left" valign="top">Multicriteria decision making (MCDM)</td>
<td align="left" valign="top">Manufacturing</td>
<td align="left" valign="top">Fuzzy CRITIC method</td>
<td align="left" valign="top">This paper identifies three major human-centric cybersecurity risks within the manufacturing industry: employee resistance to cybersecurity practices and data privacy measures, insufficient employee training and education, and inadequate integration between humans and machines.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref53">Rishiwal et al. (2024)</xref>
</td>
<td align="left" valign="top">Review</td>
<td align="left" valign="top">Vehicle communication and PRISMA method</td>
<td align="left" valign="top">AI/ML models</td>
<td align="left" valign="top">This paper proposes a blockchain-based, human-centric security framework that ensures authorised access to Vehicle-to-Everything (V2X) communication networks, including Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), and Vehicle-to-Network (V2N) communication.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref64">van der Kleij et al. (2024)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Software</td>
<td align="left" valign="top">Not Defined</td>
<td align="left" valign="top">This paper highlights the need for human-centric security engineering that balances usability and cybersecurity, integrates organisational culture, and investigates the interplay between organisational elements and cybersecurity culture in practice.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref15">Dikito and Kaiser (2023)</xref>
</td>
<td align="left" valign="top">Survey</td>
<td align="left" valign="top">Banking</td>
<td align="left" valign="top">SPSS 23, Smart PLS Version 3.2.8, SEM</td>
<td align="left" valign="top">This paper indicates that human factors (awareness, cybersecurity policy, and top management) have a direct and negative impact on identity theft.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref59">Tabari (2021)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Communication networks</td>
<td align="left" valign="top">IoT devices and Honeypots</td>
<td align="left" valign="top">This thesis has proposed an Internet of Things honeypot framework (MPMFPot) to observe attackers&#x2019; behavior within a controlled environment.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref45">Morgan et al. (2020)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Industry Settings</td>
<td align="left" valign="top">Airbus Accelerator in Human-Centric Cyber Security (H2CS) Programme</td>
<td align="left" valign="top">This paper discusses how human-centric cybersecurity research within organisations enhances understanding of human vulnerabilities and enables socio-technical practices that strengthen overall cyber hygiene.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref36">Klein and Hossain (2020)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Arctic region</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper discusses how digitalisation and climate change jointly reshape the Arctic, highlighting the need for cybersecurity to be human-centric. This includes safeguarding people&#x2019;s privacy, access, and critical services while leveraging digital tools (e.g., social media, online platforms) to expand participation, resilience, and cultural preservation.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref27">Hussain (2017)</xref>
</td>
<td align="left" valign="top">Review</td>
<td align="left" valign="top">Government</td>
<td align="left" valign="top">NADRA (National Database and Registration Authority)</td>
<td align="left" valign="top">This paper presents a framework for detecting web vulnerabilities, monitoring traffic, utilising modern web tools, executing a six-step scan with four testing stages, and displaying outcomes.</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="tab4">
<label>Table 4</label>
<caption>
<p>Summary of observations of papers based on authentication and identity.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Paper</th>
<th align="left" valign="top">Methodology</th>
<th align="left" valign="top">Sector</th>
<th align="left" valign="top">Tools/technologies/models/standards/frameworks</th>
<th align="left" valign="top">Outcome</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref26">Hilowle et al. (2024)</xref>
</td>
<td align="left" valign="top">Survey</td>
<td align="left" valign="top">Government</td>
<td align="left" valign="top">SEM, multiple linear regression analysis, TFI model, theory of planned behavior (TPB), and Qualtrics software</td>
<td align="left" valign="top">This paper identifies that security, privacy, usability, flexibility, and cultural&#x2013;social factors significantly influence Australians&#x2019; intention to use national digital identity systems (NDIDs), while trust and cybersecurity awareness do not.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref65">Wang (2024)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Health</td>
<td align="left" valign="top">Blockchain, Cloud, and Cryptography</td>
<td align="left" valign="top">This paper proposes a blockchain-based system that securely protects patient data, facilitates the easy and private sharing of medical records, and operates efficiently.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref46">Muhudin Hilowle (2023)</xref>
</td>
<td align="left" valign="top">Survey</td>
<td align="left" valign="top">Government</td>
<td align="left" valign="top">SEM, multiple linear regression analysis, TFI model, theory of planned behavior (TPB), Qualtrics software, and Thematic analysis</td>
<td align="left" valign="top">This thesis shows that users adopt national digital identity systems (NDIDs) when they are secure, private, flexible, and easy to use, but low trust, poor cybersecurity awareness, and social or cultural concerns reduce adoption.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref41">Marino (2023)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Smart home network</td>
<td align="left" valign="top">Verefoo (Verified Refinement and Optimized Orchestration) framework</td>
<td align="left" valign="top">This thesis extends the Verefoo framework to enable the automatic allocation and configuration of Parental Control Systems, addressing a critical challenge within the context of home networks.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref25">Hilowle et al. (2023)</xref>
</td>
<td align="left" valign="top">Review</td>
<td align="left" valign="top">Government</td>
<td align="left" valign="top">Technology formal informal (TFI) model, unified theory of acceptance and use of technology (UTAUT) model</td>
<td align="left" valign="top">This paper proposes a multi-level conceptual framework that offers opportunities to contextualise human-centric cybersecurity factors influencing user adoption of NDID.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref50">Ra et al. (2021)</xref>
</td>
<td/>
<td align="left" valign="top">Human</td>
<td align="left" valign="top">Human Internet of Things (HIoT) and blockchain</td>
<td align="left" valign="top">This paper proposes a human-centric identity management system (IDM) system based on blockchain and zero-knowledge proof (ZKP) for privacy preservation in the HIoT environment.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref38">Lakshmisree (2016)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Biometrics</td>
<td align="left" valign="top">This paper presents a user-friendly authentication mechanism to secure biometric information.</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="tab5">
<label>Table 5</label>
<caption>
<p>Summary of observations of papers based on human factors.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Paper</th>
<th align="left" valign="top">Methodology</th>
<th align="left" valign="top">Sector</th>
<th align="left" valign="top">Tools/technologies/ models/standards/ frameworks</th>
<th align="left" valign="top">Outcome</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" char="&#x00D7;">
<xref ref-type="bibr" rid="ref47">Narayanan and Srinivasan (2025)</xref>
</td>
<td align="left" valign="top">Experimental</td>
<td align="left" valign="top">Finance</td>
<td align="left" valign="top">Behaviour Analytics</td>
<td align="left" valign="top">This paper presents that a Hybrid human-centric cybersecurity (AI + human insight) approach using behavioural analytics significantly improves detection and prevention of phishing, credential theft, and social engineering while reducing errors and enhancing user experience in financial services.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref28">Jamil et al. (2025)</xref>
</td>
<td align="left" valign="top">Survey</td>
<td align="left" valign="top">Market Research</td>
<td align="left" valign="top">Protection Motivation Theory (PMT)-based model, SEM, SPSS version 26 and the AMOS software</td>
<td align="left" valign="top">This paper presents a research model based on PMT, demonstrating that all protection motivation constructs except threat susceptibility effectively predict users&#x2019; protective behaviours. Additionally, it finds that higher cybersecurity costs negatively influence users&#x2019; engagement in safe cyber practices.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref4">Ayodele et al. (2025)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper discusses various human vulnerabilities and proposes a multi-faceted approach to enhance human-centric cybersecurity using AI tools and training programs.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref24">Hakimi et al. (2024)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper emphasises that a human-centric approach, integrating technology with an understanding of human behaviour and cognition, is essential for building effective and resilient cybersecurity systems.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref52">Rao (2024)</xref>
</td>
<td align="left" valign="top">Case study</td>
<td align="left" valign="top">Cyberspace</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This thesis examines the significance of human rights in the cyber domain, taking into account various geopolitical contexts. It discusses the need for creating a balanced cybersecurity strategy to protect both national security as well as individual rights.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref19">Gjerts&#x00E5;s (2024)</xref>
</td>
<td align="left" valign="top">Case study</td>
<td align="left" valign="top">Industry Settings</td>
<td align="left" valign="top">Self-Determination Theory (SDT), Visma Security Program (VSP),and Microsoft PowerBI</td>
<td align="left" valign="top">This thesis found that applying Self-Determination Theory (autonomy, competence, and relatedness) in organisational security programs boosts employee motivation, improves security compliance, and reduces human error.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref60">Tambe-Jagtap (2023)</xref>
</td>
<td align="left" valign="top">Surveys and interviews</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">Statistical and thematic analysis</td>
<td align="left" valign="top">This paper presents a human-centred cybersecurity program that integrates AI tools to significantly reduce errors, response times, and breach costs while enhancing security.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref21">Gopireddy (2022)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper discusses human behaviours and ethical considerations to enhance cybersecurity.</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="tab6">
<label>Table 6</label>
<caption>
<p>Summary of observations of papers based on education and training.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Paper</th>
<th align="left" valign="top">Methodology</th>
<th align="left" valign="top">Sector</th>
<th align="left" valign="top">Tools/technologies/models/standards/frameworks</th>
<th align="left" valign="top">Outcome</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" char="&#x00D7;">
<xref ref-type="bibr" rid="ref8">Bush and Mashatan (2025)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Smart home network</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This book chapter provides some recommendations based on a collaborative approach following human-centric principles for smart home users, vendors, and policy-makers.</td>
</tr>
<tr>
<td align="left" valign="top" char="&#x00D7;">
<xref ref-type="bibr" rid="ref33">Kelechukwu et al. (2025)</xref>
</td>
<td align="left" valign="top">Simulation and training</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">Gamification</td>
<td align="left" valign="top">This paper finds that human-centric cybersecurity training significantly outperforms traditional methods by driving sustained behavior change, markedly improving engagement, self-efficacy, secure behavior adoption, knowledge retention, and phishing resilience.</td>
</tr>
<tr>
<td align="left" valign="top" char="&#x00D7;">
<xref ref-type="bibr" rid="ref29">Jethava et al. (2025)</xref>
</td>
<td align="left" valign="top">Simulation and training</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">AI/ML</td>
<td align="left" valign="top">This book chapter proposes a toolbox that can help both technical and non-technical users to identify vulnerabilities while using Internet.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref18">Gavaza and Katsande (2023)</xref>
</td>
<td align="left" valign="top">Training</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">NIST Cybersecurity framework and NICE Framework</td>
<td align="left" valign="top">This book chapter redesigns a cybersecurity framework by combining the NIST and NICE frameworks, further strengthened by supportive environments with national laws, institutional policies, and active industry associations that foster best practices and workforce development.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref35">Kioskli et al. (2023)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Health</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper emphasises that improving cyber hygiene in healthcare requires human-centric education and practices addressing user behaviour, as most cyberattacks stem from human error and insufficient awareness of cybersecurity best practices.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref11">Coffey et al. (2018)</xref>
</td>
<td align="left" valign="top">Training</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">Online study material</td>
<td align="left" valign="top">This paper presents a training program that has been implemented for the regional university employees. The training program contents include FERPA (Family Educational Rights and Privacy Act) basics, data Security and privacy, knowledge worker skills assessment, and understanding regarding confidentiality.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref14">Depassier and Torres (2018)</xref>
</td>
<td align="left" valign="top">Simulation and Training</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">Netwars tool, DEFCON CTF 22 dataset, and AnyDesk connection software</td>
<td align="left" valign="top">This paper presents NetWars, a human-centric training tool that yielded 95% success rate in helping analysts prioritise multi-stage cyberattacks using DEF CON CTF data, with positive usability results.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref32">Kassicieh et al. (2015)</xref>
</td>
<td align="left" valign="top">Conceptual</td>
<td align="left" valign="top">Education</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper recommends a variety of cybersecurity awareness programs for training the current employees within an organisation.</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="tab7">
<label>Table 7</label>
<caption>
<p>Summary of observations of papers based on usability and privacy.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Paper</th>
<th align="left" valign="top">Methodology</th>
<th align="left" valign="top">Sector</th>
<th align="left" valign="top">Tools/technologies/models/standards/frameworks</th>
<th align="left" valign="top">Outcome</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref23">Hadi (2023)</xref>
</td>
<td align="left" valign="top">Surveys and interviews</td>
<td align="left" valign="top">Software</td>
<td align="left" valign="top">Secure Software Development Life Cycle (SSDLC)</td>
<td align="left" valign="top">This thesis suggests the need for integrating usability and cognitive cost considerations while developing cybersecurity solutions.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref22">Grobler et al. (2021)</xref>
</td>
<td align="left" valign="top">Review</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper highlights that effective cybersecurity requires shifting from functional and usage-centric approaches to a user-centric model by integrating user, usage, and usability (the 3&#x202F;U&#x2019;s) into security design, implementation, and deployment.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref30">Kamm&#x00FC;ller (2018)</xref>
</td>
<td align="left" valign="top">Case study</td>
<td align="left" valign="top">Health</td>
<td align="left" valign="top">Isabelle Insider framework, Attack Tree Analysis, BIP framework, cryptography, SSP for Bluetooth</td>
<td align="left" valign="top">This paper presents a formal methods approach using Isabelle to enhance security and privacy in human-centric IoT healthcare systems.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref31">Kamm&#x00FC;ller et al. (2017)</xref>
</td>
<td align="left" valign="top">Case study</td>
<td align="left" valign="top">Health</td>
<td align="left" valign="top">eFRIENDS ethical framework, Isabelle Insider framework, Attack Tree Analysis, BIP framework, cryptography, SSP for Bluetooth</td>
<td align="left" valign="top">This paper presents a formal method and ethical design that can enhance the security, privacy, and trustworthiness of IoT healthcare systems by detecting insider risks and implementing end-to-end encryption.</td>
</tr>
<tr>
<td align="left" valign="top">
<xref ref-type="bibr" rid="ref3">Alemerien (2017)</xref>
</td>
<td align="left" valign="top">Experimentation</td>
<td align="left" valign="top">Social Network</td>
<td align="left" valign="top">Not defined</td>
<td align="left" valign="top">This paper finds that social network interfaces designed using the proposed user-friendly security patterns were more positively received and accepted by users compared to existing Facebook interfaces.</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec9">
<label>2.5</label>
<title>Data collection and analysis of results</title>
<p>The quality assessment of the identified literature for bias and rigor was a critical component of this systematic review. The web-based search strategy employed across the selected databases is illustrated in <xref ref-type="fig" rid="fig2">Figure 2</xref>, with the specific search strings detailed in Section 2.3. Most of the identified literature was sourced from the Google Scholar database, supplemented by other reputable databases like Scopus, IEEE Xplore, and Web of Science. Each study was evaluated by independent researchers, ensuring that only those meeting well-defined inclusion criteria were included in the analysis, thereby reducing selection bias. After removing duplicates and irrelevant materials, a total of 44 papers published between 2015 and 2025 were selected for review.</p>
<p>To ensure the robustness of this systematic review, several validity threats were addressed, including selection bias, mitigated by clear eligibility criteria and the use of multiple reputable databases (Google Scholar, Scopus, IEEE Xplore, and Web of Science). Limitations, such as restricting studies to English and a specific timeframe, were acknowledged as potential exclusions of relevant works. Information bias, stemming from limited search queries, was minimised through consensus meetings among researchers, with three independently analysing and resolving discrepancies in selected papers. Adhering to the PRISMA method, the review assessed 44 studies for quality and relevance, focusing on human-centric cybersecurity. The selected studies originated from high-quality, peer-reviewed journals, which not only enhanced the credibility of the findings but also underscored the rigor of the evaluation process.</p>
<p>Given that human-centric cybersecurity is an emerging field with limited available research, the scope of this paper is confined to exploring this specific area rather than offering a comprehensive or critical literature review, utilising primarily four databases. Future research, however, could very well extend this scope and explore human-centric cybersecurity in a continuously and ever-changing landscape.</p>
</sec>
</sec>
<sec sec-type="results" id="sec10">
<label>3</label>
<title>Results</title>
<sec id="sec11">
<label>3.1</label>
<title>Trends in human-centric research</title>
<p>This section presents results from the literature, illustrating the trend in human-centric research over a decade from 2015 to 2025. We used VOSviewer in <xref ref-type="fig" rid="fig3">Figure 3</xref> to analyse the keywords used by the authors of the 44 reviewed papers.</p>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption>
<p>Keywords reflected in the literature (44 papers) over a period of 10&#x202F;years from 2015 to 2025.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g003.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Network graph visualization showing key terms such as privacy, cybersecurity, awareness, attack, and data connected by numerous colored lines representing relationships. Color gradient indicates publication years from 2016 to 2024.</alt-text>
</graphic>
</fig>
<p><xref ref-type="fig" rid="fig3">Figure 3</xref> is a keyword co-occurrence network visualisation showing the evolution and interconnections of major research themes in the domain of human-centric cybersecurity over time. Each node represents a keyword, and the node&#x2019;s size indicates its frequency or importance within the dataset, while the lines (edges) between nodes reflect how often those terms co-occur. The colour gradient, ranging from blue (2015) to yellow (2025), illustrates the temporal progression of topics. Early research (blue-green nodes such as privacy, attack, data, and access control) focused on technical and data-centric issues. In contrast, more recent studies (yellow nodes such as human error, human behaviour, human factor, awareness, and organisational culture) emphasise the human and organisational aspects of cybersecurity. This shift highlights a growing recognition of the critical role of human factors and culture in maintaining cybersecurity resilience.</p>
<p><xref ref-type="fig" rid="fig4">Figure 4</xref> (Top left) Illustrates a significant upward trend in human-centric research publications over time. The years from 2015 to 2022 exhibit limited research activity, but a steady increase begins in 2023, indicating a growing global focus on human-centric cybersecurity.</p>
<fig position="float" id="fig4">
<label>Figure 4</label>
<caption>
<p>Timeline of the trend of human-centric research distributed over time, document types, authors&#x2019; keywords, and sectors.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g004.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Four data visualizations summarize research papers: a bar chart at top left shows an increase in paper counts from two in 2015&#x2013;2016 to a peak of twelve in 2024, with counts by year; a pie chart at top right displays document types, with articles dominating at fifty-six percent, followed by conferences, theses, and book chapters; a word cloud at bottom left highlights keywords like "Behavior," "humanfactors," "Phishing," "privacy," and "detection"; a bar chart at bottom right indicates education, government, and health as leading sectors for paper topics, with education having the highest count.</alt-text>
</graphic>
</fig>
<p><xref ref-type="fig" rid="fig4">Figure 4</xref> (top right) shows that it is distributed across academic journals (57%), conferences (20%), theses (14%), and book chapters (9%). <xref ref-type="fig" rid="fig4">Figure 4</xref> (bottom-left) presents an analysis of keywords used in the reviewed literature, revealing a focus on terms such as behaviour, privacy, human factors, digital identity, usability, psychological, and others. We have excluded &#x201C;human-centric&#x201D; and &#x201C;cybersecurity&#x201D; keywords, as they appear with the highest frequency due to their prominence in our search criteria. Additionally, <xref ref-type="fig" rid="fig4">Figure 4</xref> (bottom right) shows that the education and government sectors lead with the highest focus at 16 and 11%, respectively, followed by the health sector at 9% and the software sector at 7%. Overall, the analysis reveals that cybersecurity research is most concentrated in education, governance, and healthcare, reflecting a growing focus on human-centric and policy-driven security approaches in these key sectors.</p>
<p>The final 44 papers in the literature provide an overview of human-centric cybersecurity research from 21 countries. <xref ref-type="fig" rid="fig5">Figure 5</xref> (top left) shows that most contributions originate from Australia, the USA, and the UK, collectively accounting for approximately half of the research. Other notable contributors include India, China, and Norway. Next, <xref ref-type="fig" rid="fig5">Figure 5</xref> (top right) represents that these contributions are well-balanced, with conceptual, experimental, and survey approaches each accounting for approximately 64% of the total, indicating a mature blend of theoretical and applied research.</p>
<fig position="float" id="fig5">
<label>Figure 5</label>
<caption>
<p>Distribution of the trend of human-centric research distributed over various regions, methods, and various tools and technologies.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g005.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Three data visualizations summarize a research review: a bar chart shows most papers are from Australia and the USA, a second bar chart lists conceptual and experimentation as top methodologies, and a word cloud highlights frequent terms like structural equation modelling, cryptography, and thematic analysis.</alt-text>
</graphic>
</fig>
<p>Furthermore, <xref ref-type="fig" rid="fig5">Figure 5</xref> (bottom) shows a word cloud of tools/technologies/standards/frameworks used across human-centric cybersecurity research. Most of the research applies Structural Equational Modelling (SEM) (<xref ref-type="bibr" rid="ref15">Dikito and Kaiser, 2023</xref>; <xref ref-type="bibr" rid="ref26">Hilowle et al., 2024</xref>; <xref ref-type="bibr" rid="ref28">Jamil et al., 2025</xref>; <xref ref-type="bibr" rid="ref46">Muhudin Hilowle, 2023</xref>), cryptography (<xref ref-type="bibr" rid="ref30">Kamm&#x00FC;ller, 2018</xref>; <xref ref-type="bibr" rid="ref31">Kamm&#x00FC;ller et al., 2017</xref>; <xref ref-type="bibr" rid="ref56">Ryan, 2025</xref>; <xref ref-type="bibr" rid="ref65">Wang, 2024</xref>), thematic analysis (<xref ref-type="bibr" rid="ref46">Muhudin Hilowle, 2023</xref>; <xref ref-type="bibr" rid="ref60">Tambe-Jagtap, 2023</xref>; <xref ref-type="bibr" rid="ref63">Troublefield, 2025</xref>), Technical Formal Informal (TFI) model (<xref ref-type="bibr" rid="ref25">Hilowle et al., 2023</xref>, <xref ref-type="bibr" rid="ref26">2024</xref>; <xref ref-type="bibr" rid="ref46">Muhudin Hilowle, 2023</xref>), Blockchain (<xref ref-type="bibr" rid="ref50">Ra et al., 2021</xref>; <xref ref-type="bibr" rid="ref65">Wang, 2024</xref>), behaviour analytics (<xref ref-type="bibr" rid="ref42">Mohammed, 2025</xref>; <xref ref-type="bibr" rid="ref47">Narayanan and Srinivasan, 2025</xref>) and others.</p>
</sec>
<sec id="sec12">
<label>3.2</label>
<title>Review results by research themes</title>
<p><xref ref-type="fig" rid="fig6">Figure 6</xref> presents the timeline of publications from 2015 to 2025, providing an overview of research in human-centric cybersecurity across five key themes. The themes, along with the number of literatures within each theme, include frameworks and policies (16), education and training (8), human factors (8), authentication and identity (7), and usability and privacy (5). In the year 2024, frameworks and policies dominated (<xref ref-type="bibr" rid="ref2">Al Ansari et al., 2024</xref>; <xref ref-type="bibr" rid="ref37">Kurdi et al., 2024</xref>; <xref ref-type="bibr" rid="ref48">Ozkan Ozen et al., 2024</xref>; <xref ref-type="bibr" rid="ref53">Rishiwal et al., 2024</xref>; <xref ref-type="bibr" rid="ref63">Troublefield, 2025</xref>; <xref ref-type="bibr" rid="ref64">van der Kleij et al., 2024</xref>), accounting for half of all papers, followed by notable contributions on human factors (<xref ref-type="bibr" rid="ref19">Gjerts&#x00E5;s, 2024</xref>; <xref ref-type="bibr" rid="ref24">Hakimi et al., 2024</xref>; <xref ref-type="bibr" rid="ref28">Jamil et al., 2025</xref>; <xref ref-type="bibr" rid="ref52">Rao, 2024</xref>) and authentication and identity (<xref ref-type="bibr" rid="ref26">Hilowle et al., 2024</xref>; <xref ref-type="bibr" rid="ref65">Wang, 2024</xref>). A similar pattern emerged in 2025, where frameworks and policies once again took precedence (<xref ref-type="bibr" rid="ref1">Abdallah et al., 2025</xref>; <xref ref-type="bibr" rid="ref42">Mohammed, 2025</xref>; <xref ref-type="bibr" rid="ref56">Ryan, 2025</xref>; <xref ref-type="bibr" rid="ref62">Tari and Mahmud, 2025</xref>; <xref ref-type="bibr" rid="ref66">Zhou and Wang, 2025</xref>), but this time with an added emphasis on education and training (<xref ref-type="bibr" rid="ref8">Bush and Mashatan, 2025</xref>; <xref ref-type="bibr" rid="ref29">Jethava et al., 2025</xref>; <xref ref-type="bibr" rid="ref33">Kelechukwu et al., 2025</xref>). This shift indicates a maturing research landscape, moving from isolated, technical studies toward more comprehensive, policy-oriented, and human-centred investigations. The refined results for each theme are presented in sections 3.2.1&#x2013;3.2.5.</p>
<fig position="float" id="fig6">
<label>Figure 6</label>
<caption>
<p>Timeline of publications from 2015 to 2025 with five themes.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g006.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Stacked bar chart showing the annual count of papers by five themes from 2015 to 2025. The number of papers rises sharply in 2023 and peaks in 2024, especially in Education and Training, with color-coded segments: Authentication and Identity (dark blue), Education and Training (orange), Frameworks and Policies (light blue), Human Factors (purple), and Usability and Privacy (pink). Themes are distributed unevenly each year, with Education and Training dominating recent years.</alt-text>
</graphic>
</fig>
<sec id="sec13">
<label>3.2.1</label>
<title>Frameworks and policies</title>
<p>This theme, at around 36%, is the most dominant and shows that most human-centric cybersecurity research has led to the introduction of frameworks and policies. The focus of these studies is on developing structured, strategic approaches that integrate human factors into cybersecurity practices across multiple sectors, including government and software. The frameworks commonly emphasise behaviour, psychological resilience, awareness, risks, digitalisation, and quality as key components, aiming to improve risk management, digital ecosystem, and organisational security culture. Methodologically, conceptual and experimental approaches are applied, reflecting a balance between theory development and practical validation. The reviewed literature within this theme uses analytical tools and standards, such as PRISMA (<xref ref-type="bibr" rid="ref2">Al Ansari et al., 2024</xref>; <xref ref-type="bibr" rid="ref53">Rishiwal et al., 2024</xref>), AI/ML-based models (<xref ref-type="bibr" rid="ref53">Rishiwal et al., 2024</xref>; <xref ref-type="bibr" rid="ref66">Zhou and Wang, 2025</xref>), Game Theory (<xref ref-type="bibr" rid="ref1">Abdallah et al., 2025</xref>) and SDLC (<xref ref-type="bibr" rid="ref23">Hadi, 2023</xref>; <xref ref-type="bibr" rid="ref37">Kurdi et al., 2024</xref>), highlights a systematic, data-driven orientation in this category. Overall, this theme emphasises a shift toward human-centric cybersecurity principles through standardised, policy-oriented cybersecurity frameworks.</p>
</sec>
<sec id="sec14">
<label>3.2.2</label>
<title>Education and training</title>
<p>Within this theme, 8 of 44 papers (18%) were identified that focus on developing and enhancing cybersecurity awareness and skills through structured programs (<xref ref-type="bibr" rid="ref11">Coffey et al., 2018</xref>; <xref ref-type="bibr" rid="ref32">Kassicieh et al., 2015</xref>), frameworks (<xref ref-type="bibr" rid="ref18">Gavaza and Katsande, 2023</xref>), and training tools like NetWars (<xref ref-type="bibr" rid="ref14">Depassier and Torres, 2018</xref>). Of these eight papers, six focus on the education sector, one addresses health (<xref ref-type="bibr" rid="ref35">Kioskli et al., 2023</xref>) and another explores smart home networks (<xref ref-type="bibr" rid="ref8">Bush and Mashatan, 2025</xref>). Collectively, these papers emphasise the importance of human-centric education for organisational employees, smart home users, and both technical and non-technical users. Such education improves cyber hygiene and helps mitigate breaches caused by human error and lack of awareness. Moreover, the methodology distribution reveals a firm reliance on training and conceptual approaches, indicating that much of this research focuses on designing and testing educational models or conceptual frameworks rather than purely technical solutions. Together, these works highlight the critical role of education, training, and continuous skill development in fostering a resilient cybersecurity culture.</p>
</sec>
<sec id="sec15">
<label>3.2.3</label>
<title>Human factors</title>
<p>Within this theme, 8 out of 44 papers (18%) were identified that highlight the growing emphasis on a human-centric approach to cybersecurity, integrating technology with an understanding of human behaviour, cognition, and motivation. The studies demonstrate that psychological frameworks such as Protection Motivation Theory (PMT) (<xref ref-type="bibr" rid="ref6">Boer and Seydel, 1996</xref>) and Self-Determination Theory (SDT) (<xref ref-type="bibr" rid="ref12">Deci and Ryan, 1980</xref>) effectively predict and enhance users&#x2019; protective behaviours and compliance, while also showing that higher cybersecurity costs can discourage safe practices. Some literature proposes AI-assisted, ethically grounded strategies to address human and social engineering vulnerabilities (<xref ref-type="bibr" rid="ref4">Ayodele et al., 2025</xref>; <xref ref-type="bibr" rid="ref47">Narayanan and Srinivasan, 2025</xref>), reduce security incidents, and balance national security with individual rights (<xref ref-type="bibr" rid="ref52">Rao, 2024</xref>). Together, these studies reinforce the need for effective, resilient cybersecurity systems to prioritise human factors alongside technological innovation.</p>
</sec>
<sec id="sec16">
<label>3.2.4</label>
<title>Authentication and identity</title>
<p>Within this theme, 7 out of 44 papers (16%) were identified that have explored diverse approaches to enhancing security, privacy, and user adoption in digital identity and authentication systems. Out of these, three papers (43%) focus on applications in the government sector (<xref ref-type="bibr" rid="ref25">Hilowle et al., 2023</xref>, <xref ref-type="bibr" rid="ref26">2024</xref>; <xref ref-type="bibr" rid="ref46">Muhudin Hilowle, 2023</xref>). The analytical tools and techniques employed across these studies include the technical formal-informal (TFI) model, structural equation modelling (SEM), multiple linear regression, and Qualtrics software (<xref ref-type="bibr" rid="ref25">Hilowle et al., 2023</xref>, <xref ref-type="bibr" rid="ref26">2024</xref>; <xref ref-type="bibr" rid="ref46">Muhudin Hilowle, 2023</xref>) as well as blockchain technologies (<xref ref-type="bibr" rid="ref50">Ra et al., 2021</xref>; <xref ref-type="bibr" rid="ref65">Wang, 2024</xref>). Methodologically, three papers adopt experimental designs (<xref ref-type="bibr" rid="ref38">Lakshmisree, 2016</xref>; <xref ref-type="bibr" rid="ref41">Marino, 2023</xref>; <xref ref-type="bibr" rid="ref65">Wang, 2024</xref>) while other papers are based on survey and review approaches. Collectively, studies in this theme advance human-centric, technology-driven models for secure, private, and user-friendly authentication and identity management solutions.</p>
</sec>
<sec id="sec17">
<label>3.2.5</label>
<title>Usability and privacy</title>
<p>Within this theme, 5 of 44 papers (11%) were identified that focus on applying human-centric approaches to enhance cybersecurity design, usability, and trust across different sectors. Two case studies in the healthcare sector employed formal methods such as the Isabelle Insider Framework, Attack Tree Analysis, (Behaviour, Interaction, Priority) BIP framework, and Secure Simple Pairing (SSP) for Bluetooth to strengthen IoT security, privacy, and ethical compliance, ensuring end-to-end protection and insider risk detection (<xref ref-type="bibr" rid="ref30">Kamm&#x00FC;ller, 2018</xref>; <xref ref-type="bibr" rid="ref31">Kamm&#x00FC;ller et al., 2017</xref>). A review paper emphasised the need to shift from functional and usage-centric models toward a user-centric framework that integrates user, usage, and usability the &#x201C;3&#x202F;U&#x2019;s&#x201D; into cybersecurity design and deployment (<xref ref-type="bibr" rid="ref22">Grobler et al., 2021</xref>). Other studies focus on incorporating user-friendly security interfaces into social media networks (<xref ref-type="bibr" rid="ref3">Alemerien, 2017</xref>) and on including usability and cognitive cost considerations within secure software design processes (<xref ref-type="bibr" rid="ref23">Hadi, 2023</xref>). Together, these studies highlight a growing focus on embedding human-centric designs and usability into cybersecurity systems to enhance both effectiveness and user trust.</p>
</sec>
</sec>
<sec id="sec18">
<label>3.3</label>
<title>Framework for human-centric cybersecurity</title>
<p>This section presents a framework for human-centric cybersecurity to enable Industry 5.0, in which humans have direct interaction with systems and solutions are more customer-oriented. The framework gathers insights from a straightforward survey conducted in Europe to understand how individuals experience and perceive cybersecurity in their everyday digital lives, focusing on the balance between security and ease of use.</p>
<fig position="float" id="fig7">
<label>Figure 7</label>
<caption>
<p>Response for the most user-friendly security features from 30 respondents.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g007.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Horizontal bar chart displaying user preferences for authentication improvements, with biometric login most preferred at twenty-four votes, followed by single sign-on with fifteen, and auto-update security patches with fourteen. Cybersecurity training courses and &#x201C;other&#x201D; options received the fewest selections.</alt-text>
</graphic>
</fig>
<sec id="sec19">
<label>3.3.1</label>
<title>Survey</title>
<p>We have conducted a simple and small user study, which is entirely exploratory in nature. We acknowledge that the comparably small sample size of 30 participants limits its statistical and prognostic power. Data has been collected through a well-structured anonymous questionnaire that aims to explore users&#x2019; confidence in following security practices, which measures they find most annoying, and whether these factors affect productivity. The survey also gathers suggestions for making cybersecurity more user-friendly, helping to design security systems that protect effectively while remaining convenient and less disruptive. The findings primarily serve the illustrative purpose of identifying usability concerns rather than providing novel and overall generalisable insights. It intends to contextualise the framework with lived user experiences.</p>
<p>The survey results are based on 30 respondents from Europe. The majority of the survey respondents are aged 31&#x2013;50, with a small number under 30 or over 50. The survey respondents were split between women (47%) and men (53%). Most survey respondents work in the private sector (47%), followed by academia (30%), with a smaller representation from the public sector (10%) and other fields (13%). Most respondents (80%) considered cybersecurity extremely important, while others found it somewhat important. Responses were mixed: 30% of participants found cybersecurity measures annoying daily, and almost equal shares (27%) reported annoyance monthly or seasonally, while fewer reported annoyance weekly (7%), yearly (3%), or never (7%).</p>
<p>Respondents identified frequent password resets (33.3%) and frequent authentication (26.7%) as the most annoying cybersecurity measures, while security awareness training and system updates were rated as less annoying overall. Responses were evenly divided: 40% of participants believed cybersecurity measures reduce productivity, 43% said they do not, and 17% were unsure. Most respondents (46%) agreed and strongly agreed that secure systems are designed with user convenience in mind, while 27% disagreed and 27% remained neutral.</p>
<p>Most respondents (80%) found biometric login to be the most user-friendly security feature, followed by single sign-on (50%) and automatic security patch updates (46%), as shown in <xref ref-type="fig" rid="fig7">Figure 7</xref>.</p>
<p>Additionally, respondents suggested making cybersecurity more user-friendly by implementing simplified, built-in password managers, unified authentication systems such as biometrics, passwordless logins, or single sign-on (SSO). Many emphasised the need for fewer or more thoughtful MFA prompts (e.g., a number to confirm in the system rather than the ones we must type a given 6-digit number), less frequent password resets, and a universal digital ID or identity wallet. Others proposed more precise explanations and better-designed training, as well as automated background protection and AI-driven adaptive systems that maintain security without interrupting work. Overall, participants called for a balance between security and convenience, aiming for systems that are intuitive, seamless, and minimally intrusive.</p>
<p>The results from the survey provide valuable insights into the effectiveness of the proposed framework and highlight how participants perceive various aspects of cybersecurity in their daily lives. This feedback plays a crucial role in assessing the framework&#x2019;s strengths and areas for improvement, ultimately guiding future enhancements and ensuring it meets user needs more effectively. Henceforth, these suggestions are categorised for mapping them to the proposed framework as discussed in Section 3.3.2.</p>
</sec>
<sec id="sec21">
<label>3.3.2</label>
<title>Proposed framework</title>
<p>The proposed framework (See <xref ref-type="fig" rid="fig8">Figure 8</xref>) uses the People, Process, and Technology (PPT) model to demonstrate how these elements can be incorporated into a human-centric cybersecurity approach. When we consider the interaction between these elements, we see three main aspects:</p>
<list list-type="order">
<list-item>
<p>Usability represents the interface between People and Technology, ensuring systems are user-friendly, simple, and accessible.</p>
</list-item>
<list-item>
<p>Automation defines the connection between Technology and Process, enabling efficiency and consistency through intelligent systems.</p>
</list-item>
<list-item>
<p>Collaboration captures the link between People and Process, fostering teamwork, communication, and shared responsibility in maintaining security.</p>
</list-item>
</list>
<fig position="float" id="fig8">
<label>Figure 8</label>
<caption>
<p>Framework for human-centric cybersecurity.</p>
</caption>
<graphic xlink:href="fcomp-08-1764808-g008.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Venn diagram inside a large triangle labeled Human-centric, Resilient, and Sustainable at each corner, illustrating overlap of People, Process, and Technology within Collaboration, Usability, and Automation. Left, purple bullet points detail organizational, policy, management, and workflow factors. Right, green bullet points list training, user experience, psychological, cognitive, demographic, and cultural factors. Orange bullet points highlight digitalization, artificial intelligence, adaptive and emerging technologies, integration, and scalability.</alt-text>
</graphic>
</fig>
<p>Together, these interactions form a balanced and adaptive framework that prioritizes human factors while leveraging technological and procedural strengths to achieve resilient cybersecurity in Industry 5.0. All factors influencing the PPT model in the proposed framework have been considered, based on the literature and the authors&#x2019; experiences. It is also important to note that this framework is not intended to be applied statically or rigidly. For instance, elements of automation can emerge within the People-Technology interface when individuals interact with technology so naturally and routinely that the behaviour itself becomes automated. Similarly, collaborative dynamics can influence the Process-Technology interface, where processes continuously inform technological adjustments and, in turn, technologies shape or refine procedural workflows. This interplay becomes even more pronounced with the adoption of AI-driven methodologies, which further reinforce and enhance the collaborative dimension of the framework.</p>
<p>Additionally, we have conducted a PPT-based analysis, as shown in <xref ref-type="table" rid="tab8">Table 8</xref>, that illustrates how the three elements of the PPT Model of our framework are reflected in the reviewed literature.</p>
<table-wrap position="float" id="tab8">
<label>Table 8</label>
<caption>
<p>PPT-based analysis of the literature.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" char="&#x00D7;">PPT model element</th>
<th align="char" valign="top" char="&#x00D7;">Description</th>
<th align="char" valign="top" char="&#x00D7;">Papers</th>
<th align="char" valign="top" char="&#x00D7;">Number of papers</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" char="&#x00D7;">People/human</td>
<td align="left" valign="top">Literature in this group examines the influence of human behavior, cognition, motivation, usability, skills, and decision-making on cybersecurity.</td>
<td align="left" valign="top"><xref ref-type="bibr" rid="ref1">Abdallah et al. (2025)</xref>; <xref ref-type="bibr" rid="ref2">Al Ansari et al. (2024)</xref>; <xref ref-type="bibr" rid="ref4">Ayodele et al. (2025)</xref>; <xref ref-type="bibr" rid="ref15">Dikito and Kaiser (2023)</xref>; <xref ref-type="bibr" rid="ref19">Gjerts&#x00E5;s (2024)</xref>; <xref ref-type="bibr" rid="ref21">Gopireddy (2022)</xref>; <xref ref-type="bibr" rid="ref22">Grobler et al. (2021)</xref>; <xref ref-type="bibr" rid="ref24">Hakimi et al. (2024)</xref>; <xref ref-type="bibr" rid="ref26">Hilowle et al. (2024)</xref>; <xref ref-type="bibr" rid="ref28">Jamil et al. (2025)</xref>; <xref ref-type="bibr" rid="ref33">Kelechukwu et al. (2025)</xref>; <xref ref-type="bibr" rid="ref46">Muhudin Hilowle (2023)</xref>; <xref ref-type="bibr" rid="ref52">Rao (2024)</xref>; <xref ref-type="bibr" rid="ref60">Tambe-Jagtap (2023)</xref>; <xref ref-type="bibr" rid="ref14">Depassier and Torres (2018)</xref></td>
<td align="center" valign="top">15</td>
</tr>
<tr>
<td align="left" valign="top" char="&#x00D7;">Process</td>
<td align="left" valign="top">Literature in this group consists of organisational, managerial, and procedural mechanisms that guide cybersecurity implementation and governance.</td>
<td align="left" valign="top"><xref ref-type="bibr" rid="ref11">Coffey et al. (2018)</xref>; <xref ref-type="bibr" rid="ref18">Gavaza and Katsande (2023)</xref>; <xref ref-type="bibr" rid="ref23">Hadi (2023)</xref>; <xref ref-type="bibr" rid="ref25">Hilowle et al. (2023)</xref>; <xref ref-type="bibr" rid="ref27">Hussain (2017)</xref>; <xref ref-type="bibr" rid="ref32">Kassicieh et al. (2015)</xref>; <xref ref-type="bibr" rid="ref35">Kioskli et al. (2023)</xref>; <xref ref-type="bibr" rid="ref36">Klein and Hossain (2020)</xref>; <xref ref-type="bibr" rid="ref37">Kurdi et al. (2024)</xref>; <xref ref-type="bibr" rid="ref45">Morgan et al. (2020)</xref>; <xref ref-type="bibr" rid="ref48">Ozkan Ozen et al. (2024)</xref>; <xref ref-type="bibr" rid="ref62">Tari and Mahmud (2025)</xref>; <xref ref-type="bibr" rid="ref63">Troublefield (2025)</xref>; <xref ref-type="bibr" rid="ref64">van der Kleij et al. (2024)</xref></td>
<td align="center" valign="top">14</td>
</tr>
<tr>
<td align="left" valign="top" char="&#x00D7;">Technology</td>
<td align="left" valign="top">Literature in this group consists of technical tools, systems, architectures, and mechanisms used to implement security controls.</td>
<td align="left" valign="top"><xref ref-type="bibr" rid="ref3">Alemerien (2017)</xref>; <xref ref-type="bibr" rid="ref8">Bush and Mashatan (2025)</xref>; <xref ref-type="bibr" rid="ref29">Jethava et al. (2025)</xref>; <xref ref-type="bibr" rid="ref30">Kamm&#x00FC;ller (2018)</xref>; <xref ref-type="bibr" rid="ref31">Kamm&#x00FC;ller et al. (2017)</xref>; <xref ref-type="bibr" rid="ref38">Lakshmisree (2016)</xref>; <xref ref-type="bibr" rid="ref41">Marino (2023)</xref>; <xref ref-type="bibr" rid="ref42">Mohammed (2025)</xref>; <xref ref-type="bibr" rid="ref47">Narayanan and Srinivasan (2025)</xref>; <xref ref-type="bibr" rid="ref50">Ra et al. (2021)</xref>; <xref ref-type="bibr" rid="ref53">Rishiwal et al. (2024)</xref>; <xref ref-type="bibr" rid="ref56">Ryan (2025)</xref>; <xref ref-type="bibr" rid="ref59">Tabari (2021)</xref>; <xref ref-type="bibr" rid="ref65">Wang (2024)</xref>; <xref ref-type="bibr" rid="ref66">Zhou and Wang (2025)</xref></td>
<td align="center" valign="top">15</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This analysis shows a balanced distribution of the reviewed literature across all three dimensions. Additionally, in 2023 and 2024, research is largely concentrated on the People and Process elements, with a notable increase in People-focused studies in 2024. By 2025, a noticeable shift toward Technology-focused research is observed, indicating growing emphasis on technical solutions alongside human-centric considerations. This trend corresponds with increased concern over human-related cybersecurity risks and the expanding use of emerging digital technologies.</p>
<p>The theoretical basis for our framework is a core triad of human-centrism, resilience and sustainability, which was not mentioned by other researchers. It thereby draws on:</p>
<list list-type="bullet">
<list-item>
<p>The human-centric security elements that we have explored in the literature review, as well as</p>
</list-item>
<list-item>
<p>Resilience theory emphasising the capacity to withstand and, especially, recover from cyber threats and</p>
</list-item>
<list-item>
<p>Sustainability theory focusing on long-term viability and adaptability in an ever-changing threat landscape and technological environment.</p>
</list-item>
</list>
<p>In doing so, our framework is the first to explicitly integrate human-centrism, resilience and sustainability as equal and interdependent pillars to achieve true human-centric cybersecurity. This does not only entail an inherent shift from reactivity to proactivity through its long-term adaptive capacity to a technology-agnostic view of cybersecurity but also offers a very practical applicability. Compared to similar frameworks, it does not frame the human as a single point of failure, but a critical contributor to cyber resilience. With all three, people, processes and technology at its core, it is comprehensive and holistic.</p>
<p>The suggestions from the 30 respondents helped in evaluating the framework&#x2019;s three main aspects as:</p>
<list list-type="bullet">
<list-item>
<p>Automation: Several responses focused on the idea of automating cybersecurity to make it easier and more efficient. People suggested systems that automatically detect threats, reduce the need for repeated logins, and handle security in the background without requiring user involvement. Some mentioned AI-driven protection, automatic updates, and smart authentication that adjusts based on user behaviour. These ideas demonstrate a clear preference for intelligent, hands-off solutions, such as background security and automated monitoring systems, that enhance safety without hindering productivity.</p>
</list-item>
<list-item>
<p>Usability: Many participants emphasised the need to make cybersecurity more user-friendly and less disruptive. They preferred simple login methods such as one-click MFA, single sign-on (SSO), or passwordless authentication using biometrics or digital identity wallets. Others mentioned that frequent logins, long updates, and complex passwords reduce productivity. People also want more precise explanations of why security measures are necessary and easy-to-understand visual cues, such as lock icons, to indicate when something is secure. Suggestions included improving facial recognition in poor lighting (e.g., at night to recognise a face for login), reducing password changes, and using systems like YubiKeys or universal digital IDs. Overall, users want security that feels seamless, fast, and convenient.</p>
</list-item>
<list-item>
<p>Collaboration: Some responses highlighted the importance of teamwork, awareness, and communication in cybersecurity. People mentioned that training should be engaging, varied, and relevant to different types of work. Others believed that security teams should act as service providers, supporting users, rather than as barriers to productivity. There were also calls for clearer explanations of why certain security measures exist, so employees can better understand and accept them. A few mentioned that discussions with colleagues help find practical solutions, and that systems should support users rather than create panic or frustration. In short, collaboration between users and cybersecurity professionals is crucial to establishing a balanced and supportive security culture.</p>
</list-item>
</list>
</sec>
</sec>
</sec>
<sec id="sec22">
<label>4</label>
<title>Summary and observations</title>
<p>The key summary and observations regarding human-centric cybersecurity are as follows:</p>
<list list-type="bullet">
<list-item>
<p>The trend in human-centric research over a decade from 2015 to 2025 shows a clear trend of growth in human-centric research publications over time, peaking in 2024, when the highest number of studies was recorded.</p>
</list-item>
<list-item>
<p>Most of the human-centric research is at the conceptual as well as experimental level, indicating a blend of theoretical and applied research.</p>
</list-item>
<list-item>
<p>Most of the human-centric research focuses on developing structured, strategic approaches that integrate human factors into cybersecurity practices using advanced technologies like cryptography, and behaviour analytics across sectors such as education, government, health, software, smart home and communication networks.</p>
</list-item>
<list-item>
<p>Human-centric research focuses more on the human psychological and cognitive factors, along with the working culture. These factors are related to both the designers and users of the systems.</p>
</list-item>
<list-item>
<p>Most of the tools or technologies or models used in this research are cryptography, Structural Equational Modelling (SEM), Technical Formal Informal (TFI) model, Thematic analysis, multiple linear regression, attack tree analysis, Isabelle insider, and AI/ML.</p>
</list-item>
<list-item>
<p>The results from the survey show that frequent password resets and frequent authentication are the most annoying cybersecurity measures. Additionally, most respondents consider biometric login the most user-friendly security feature, followed by single sign-on and automatic security patch updates.</p>
</list-item>
</list>
</sec>
<sec id="sec23">
<label>5</label>
<title>Future directions</title>
<p>While this paper was primarily focused on academic discourse surrounding human-centric cybersecurity, as well as existing user-friendly security features and their mapping within the suggested framework. It did not consider alternative approaches to minimising the dilemma between security and convenience, as well as immediateness.</p>
<p>One of these alternative approaches is reframing the dilemma entirely, that is, creating circumstances in which security and usability of a product, service, or tool are intrinsically intertwined and mutually determine each other. In that case, security is not perceived as a cumbersome add-on, but as an imperative and indispensable requirement for the product, service, or tool to work and fulfil its purpose.</p>
<p>It would entail pushing the Security by Design model to its fullest extent. The model describes a proactive approach to cybersecurity that integrates security systems from the initial stages to final deployment (<xref ref-type="bibr" rid="ref9">CISA, 2023</xref>). It usually refers to digital products automatically, including built-in security features like MFA. In that case, however, the security feature is still perceived as an entity separate from the product itself. Full human-centrism of the cybersecurity feature would, however, require the security feature itself to be fully synchronised with the product.</p>
<p>To exemplify this level of maximal synchronisation, one can consider a physical safety analogy. Think of a car. Allowing for cultural nuances, think of a central European driver. The driver is most likely wearing a seat belt while driving. He/She does not perceive the act of putting on his seat belt as inducing a time delay to his drive. Instead, the two acts are so deeply intrinsically tied that the drive cannot be imagined without the seat belt.</p>
<p>Cybersecurity features - just like the safety function of a seat belt - can be framed similarly. If providing your password as a means of authentication does not delay your work but is an intrinsic part of it, we entirely circumvent the feeling that it&#x2019;s a burden.</p>
<p>Furthermore, psychological and behavioural research could provide deeper insights into how users internalise security behaviours once they become habitual and embedded in everyday workflows. Habit formation, cognitive load, trust calibration, and mental models of technology all shape whether users consider a security action as &#x201C;part of the task&#x201D; or as a separate, effortful step. Understanding these mechanisms would support the design of systems in which secure behaviour is not only automated or encouraged, but also intuitive, effortless, and self-reinforcing over time.</p>
<p>Similarly, the extent to which a cybersecurity feature is perceived as a burden is very much contextual. Further research could examine which contextual factors lead to cybersecurity being perceived as annoying. These contextual factors could span a variety of organisational, technological and individual dimensions, including workload pressures, interface design quality, organisational culture, and users&#x2019; prior experiences with security technologies, as well as cultural background, gender, and other personal characteristics.</p>
<p>Carefully conducted to avoid any potential bias and false deductions, such as a study could not only demonstrate which elements of cybersecurity are perceived as annoying for what exact reasons and by whom, but also allow for a proactive stance on cybersecurity. A forward-looking cybersecurity posture derived therefrom would enable individualised, targeted cybersecurity measures, avoiding a one-size-fits-all approach. Effective cybersecurity would imply individually targeted cybersecurity.</p>
<p>Looking at contextuality, another broader socio-economic perspective on the question of human-centrism in cybersecurity arises: how does cybersecurity interact with larger ecosystems such as national law, regulatory frameworks, corporate norms, and the different stakeholders operating within them? Human-centrism cannot be realised in isolation, and the human is not a one-dimensional notion.</p>
<p>A strong consensus across groups emerged in our study regarding frictionless authentication. However, these preferred invisible or near-invisible security layers, such as biometrics and systems that continuously validate identity without explicit user actions, need to be contextualised as well. If the human does not consciously interact with technology but merges with it, how does that change the human-techno relation at large? What risks does it pose to its beholder, if a biometric factor is the authenticator and not a de-humanised combination of characters and numbers?</p>
<p>Finally, ethics- and trust-centric design could be further explored. Human-centrism does not start or end with non-disturbance; it also entails ethical considerations, inclusivity in who the cybersecurity framework applies to, and transparency, amongst others.</p>
</sec>
<sec sec-type="conclusions" id="sec24">
<label>6</label>
<title>Conclusion</title>
<p>Humans play a significant role in cybersecurity research, whether as system designers, developers, testers, or regular users. This research concludes that most current studies are conceptual and experimental indicating a mature blend of theoretical and applied research. These studies focuses on integrating psychological, cognitive, and cultural human factors into cybersecurity practices across sectors such as education, government, health, software, smart home networks. Commonly used tools include cryptography, Structural Equational Modelling (SEM), Technical Formal-Informal (TFI), thematic analysis, and AI/ML. Findings show that frequent password resets and repeated authentication frustrate users, while biometric logins, single sign-on, and automatic updates are seen as the most user-friendly security measures. The proposed framework provides a holistic and practically applicable foundation for human-centric cybersecurity by positioning people, processes, and technology as mutually reinforcing contributors to long-term resilience and sustainability.</p>
</sec>
</body>
<back>
<sec sec-type="author-contributions" id="sec25">
<title>Author contributions</title>
<p>RKo: Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Visualization, Software, Formal analysis, Methodology, Conceptualization, Validation, Investigation. RKa: Writing &#x2013; original draft, Funding acquisition, Resources, Project administration, Supervision, Writing &#x2013; review &#x0026; editing. AW: Methodology, Investigation, Writing &#x2013; review &#x0026; editing, Conceptualization, Writing &#x2013; original draft.</p>
</sec>
<ack>
<title>Acknowledgments</title>
<p>We also acknowledge the valuable support and resources provided by the eMaintenanceLAB and two research centres, &#x201C;Center for Intelligent Asset Management&#x201D; (CIAM) and &#x201C;Lule&#x00E5; Railway Research Center - J&#x00E4;rnv&#x00E4;gstekniskt centrum&#x201D; (JVTC), in conducting this research.</p>
</ack>
<sec sec-type="COI-statement" id="sec26">
<title>Conflict of interest</title>
<p>AW was employed by Cybersecurity Redefined.</p>
<p>The remaining author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec27">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec28">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Abdallah</surname><given-names>M.</given-names></name> <name><surname>Woods</surname><given-names>D.</given-names></name> <name><surname>Cason</surname><given-names>T.</given-names></name></person-group> (<year>2025</year>). <article-title>Selfish or malicious: price of malice in human-centric security decision-making for attack graph-based interdependent systems</article-title>. <source>Int. J. Inf. Secur.</source> <volume>25</volume>:<fpage>4</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s10207-025-01180-3</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Al Ansari</surname><given-names>M. J.</given-names></name> <name><surname>Al Ahmed</surname><given-names>Y.</given-names></name> <name><surname>El Bahnaswi</surname><given-names>H. H.</given-names></name></person-group> (<year>2024</year>). <chapter-title>Balancing usability and protection in AI and data security: a human-centric approach</chapter-title>. <source>International Conference on Software Defined Systems (SDS)</source>, <fpage>80</fpage>&#x2013;<lpage>88</lpage>. doi: <pub-id pub-id-type="doi">10.1109/SDS64317.2024.10883898</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Alemerien</surname><given-names>K.</given-names></name></person-group> (<year>2017</year>). <article-title>User-friendly security patterns for designing social network websites</article-title>. <source>Int. J. Technol. Hum. Interact.</source> <volume>13</volume>, <fpage>39</fpage>&#x2013;<lpage>60</lpage>. doi: <pub-id pub-id-type="doi">10.4018/IJTHI.2017010103</pub-id></mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Ayodele</surname><given-names>G. T.</given-names></name> <name><surname>Abdulrahman</surname><given-names>I. A.</given-names></name> <name><surname>Alebiosu</surname><given-names>J.</given-names></name> <name><surname>Egbedion</surname><given-names>G. E.</given-names></name> <name><surname>Akinbolajo</surname><given-names>O. E.</given-names></name></person-group> (<year>2025</year>). Human-centric cybersecurity: addressing the human factor in cyber defense strategies. <italic>Iconic Research And Engineering Journals</italic>, 8, 1488&#x2013;1501.</mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Beerman</surname><given-names>J.</given-names></name> <name><surname>Berent</surname><given-names>D.</given-names></name> <name><surname>Falter</surname><given-names>Z.</given-names></name> <name><surname>Bhunia</surname><given-names>S.</given-names></name></person-group> (<year>2023</year>). &#x201C;<chapter-title>A review of colonial pipeline ransomware attack</chapter-title>&#x201D; in <source>2023 IEEE/ACM 23rd international symposium on cluster, cloud and internet computing workshops (CCGridW)</source>:IEEE, <fpage>8</fpage>&#x2013;<lpage>15</lpage>.</mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Boer</surname><given-names>H.</given-names></name> <name><surname>Seydel</surname><given-names>E. R.</given-names></name></person-group> (<year>1996</year>). &#x201C;<chapter-title>Protection motivation theory</chapter-title>&#x201D; in <source>Predicting health behaviour: Research and practice with social cognition models</source>. eds. <person-group person-group-type="editor"><name><surname>Conner</surname><given-names>M.</given-names></name> <name><surname>Norman</surname><given-names>P.</given-names></name></person-group> (<publisher-name>Open University Press</publisher-name>), <fpage>95</fpage>&#x2013;<lpage>120</lpage>.</mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Breque</surname><given-names>M.</given-names></name> <name><surname>De Nul</surname><given-names>L.</given-names></name> <name><surname>Petridis</surname><given-names>A.</given-names></name></person-group> (<year>2021</year>). Industry 5.0: towards a sustainable, human-centric and resilient European industry (No. KI-BD-20-021-EN-N). Directorate General for Research and Innovation (DG RTD) of the European Commission. doi: <pub-id pub-id-type="doi">10.2777/308407</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bush</surname><given-names>M.</given-names></name> <name><surname>Mashatan</surname><given-names>A.</given-names></name></person-group> (<year>2025</year>). &#x201C;<chapter-title>Bringing security home: the need for a human-centric approach to securing smart homes</chapter-title>&#x201D; in <source>The security of self: A human-centric approach to cybersecurity</source>. Canada: University of Ottawa Press.</mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll1">CISA</collab></person-group>. (<year>2023</year>). Secure by Design. Available online at: <ext-link xlink:href="https://www.cisa.gov/securebydesign" ext-link-type="uri">https://www.cisa.gov/securebydesign</ext-link> (Accessed November 1, 2025).</mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll2">CNN</collab></person-group>. (<year>2022</year>). More than 8 million Cash App Investing customers potentially impacted by data breach linked to former employee. Available online at: <ext-link xlink:href="https://edition.cnn.com/2022/04/07/tech/cash-app-investing-breach" ext-link-type="uri">https://edition.cnn.com/2022/04/07/tech/cash-app-investing-breach</ext-link> (Accessed November 1, 2025).</mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Coffey</surname><given-names>J. W.</given-names></name> <name><surname>Haveard</surname><given-names>M.</given-names></name> <name><surname>Golding</surname><given-names>G.</given-names></name></person-group> (<year>2018</year>). <article-title>A case study in the implementation of a human-centric higher education cybersecurity program</article-title>. <source>J. Cybersecur. Educ. Res. Pract.</source> <volume>2018</volume>:<fpage>4</fpage>. doi: <pub-id pub-id-type="doi">10.62915/2472-2707.1028</pub-id></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Deci</surname><given-names>E. L.</given-names></name> <name><surname>Ryan</surname><given-names>R. M.</given-names></name></person-group> (<year>1980</year>). <article-title>Self-determination theory: when mind mediates behavior</article-title>. <source>J. Mind Behav.</source> 1, <fpage>33</fpage>&#x2013;<lpage>43</lpage>.</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Deibert</surname><given-names>R. J.</given-names></name></person-group> (<year>2018</year>). <article-title>Toward a human-centric approach to cybersecurity</article-title>. <source>Ethics Int. Aff.</source> <volume>32</volume>, <fpage>411</fpage>&#x2013;<lpage>424</lpage>. doi: <pub-id pub-id-type="doi">10.1017/s0892679418000618</pub-id></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Depassier</surname><given-names>V.</given-names></name> <name><surname>Torres</surname><given-names>R</given-names></name></person-group>. (<year>2018</year>). <source>A human-centric cyber security training tool for prioritizing MSNAs</source>. In 2023 38th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW) (pp. 54&#x2013;61). IEEE.</mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dikito</surname><given-names>A. R.</given-names></name> <name><surname>Kaiser</surname><given-names>M. S.</given-names></name></person-group> (<year>2023</year>). <article-title>The relationship between human-centric cybersecurity and cybercrime</article-title>. <source>J. Inf. Technol.</source> <volume>11</volume>, <fpage>58</fpage>&#x2013;<lpage>66</lpage>. doi: <pub-id pub-id-type="doi">10.59185/cd2a2q06</pub-id></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll3">DTEX</collab></person-group>. (<year>2025</year>). Cost of insider risks. Available online at: <ext-link xlink:href="https://www2.dtexsystems.com/l/464342/2025-02-19/583csx/464342/1740000012hNhGjMpn/2025_Cost_of_Insider_Risks_Global_Report_by_Ponemon_and_DTEX.pdf" ext-link-type="uri">https://www2.dtexsystems.com/l/464342/2025-02-19/583csx/464342/1740000012hNhGjMpn/2025_Cost_of_Insider_Risks_Global_Report_by_Ponemon_and_DTEX.pdf</ext-link></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Duncan</surname><given-names>A. J.</given-names></name> <name><surname>Creese</surname><given-names>S.</given-names></name> <name><surname>Goldsmith</surname><given-names>M.</given-names></name></person-group> (<year>2012</year>). <chapter-title>Insider attacks in cloud computing</chapter-title>. <conf-name>2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications</conf-name> (UK: Liverpool), <fpage>857</fpage>&#x2013;<lpage>862</lpage>.</mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Gavaza</surname><given-names>B.</given-names></name> <name><surname>Katsande</surname><given-names>C.</given-names></name></person-group> (<year>2023</year>). &#x201C;<chapter-title>A human-centric cybersecurity framework for ensuring cybersecurity readiness in universities</chapter-title>&#x201D; in <source>Effective cybersecurity operations for Enterprise-wide systems</source> (UK: <publisher-name>IGI Global</publisher-name>), <fpage>242</fpage>&#x2013;<lpage>276</lpage>.</mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Gjerts&#x00E5;s</surname><given-names>K. R.</given-names></name></person-group> (<year>2024</year>). <source>Human-centric security: Integrating self-determination theory into organizational security practices</source>. Norway: Norwegian University of Science and Technology.</mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Gooch</surname><given-names>B.</given-names></name></person-group> (<year>2025</year>). The Louvre&#x2019;s obvious password revealed after security criticised. Available online at: <ext-link xlink:href="https://www.independent.co.uk/bulletin/news/louvre-password-heist-security-video-b2860730.html" ext-link-type="uri">https://www.independent.co.uk/bulletin/news/louvre-password-heist-security-video-b2860730.html</ext-link> (Accessed November 20, 2025).</mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gopireddy</surname><given-names>R. R.</given-names></name></person-group> (<year>2022</year>). <article-title>Human-centric cybersecurity: addressing the human element in cyber defense and ethical considerations in cybersecurity</article-title>. <source>J. Artificial Intellig. Cloud Computing</source> <volume>1</volume>, <fpage>1</fpage>&#x2013;<lpage>5</lpage>. doi: <pub-id pub-id-type="doi">10.47363/JAICC/2022(1)E118</pub-id></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Grobler</surname><given-names>M.</given-names></name> <name><surname>Gaire</surname><given-names>R.</given-names></name> <name><surname>Nepal</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>User, usage and usability: redefining human centric cyber security</article-title>. <source>Front. Big Data</source> <volume>4</volume>:<fpage>583723</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fdata.2021.583723</pub-id>, <pub-id pub-id-type="pmid">33748750</pub-id></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hadi</surname><given-names>A.</given-names></name></person-group> (<year>2023</year>). <source>User-friendly cybersecurity: A review of integrating usability and cognitive cost in SSDLC</source>. University of South-Eastern Norway.</mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hakimi</surname><given-names>M.</given-names></name> <name><surname>Quchi</surname><given-names>M. M.</given-names></name> <name><surname>Fazil</surname><given-names>A. W.</given-names></name></person-group> (<year>2024</year>). <article-title>Human factors in cybersecurity: an in depth analysis of user centric studies</article-title>. <source>Jurnal Ilmiah Multidisiplin Indonesia</source> <volume>3</volume>, <fpage>20</fpage>&#x2013;<lpage>33</lpage>. doi: <pub-id pub-id-type="doi">10.58471/esaprom.v3i01.3832</pub-id></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hilowle</surname><given-names>M.</given-names></name> <name><surname>Yeoh</surname><given-names>W.</given-names></name> <name><surname>Grobler</surname><given-names>M.</given-names></name> <name><surname>Pye</surname><given-names>G.</given-names></name> <name><surname>Jiang</surname><given-names>F.</given-names></name></person-group> (<year>2023</year>). <article-title>Users&#x2019; adoption of national digital identity systems: human-centric cybersecurity review</article-title>. <source>J. Comput. Inf. Syst.</source> <volume>63</volume>, <fpage>1264</fpage>&#x2013;<lpage>1279</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08874417.2022.2140089</pub-id></mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hilowle</surname><given-names>M.</given-names></name> <name><surname>Yeoh</surname><given-names>W.</given-names></name> <name><surname>Grobler</surname><given-names>M.</given-names></name> <name><surname>Pye</surname><given-names>G.</given-names></name> <name><surname>Jiang</surname><given-names>F.</given-names></name></person-group> (<year>2024</year>). <article-title>Improving national digital identity systems usage: human-centric cybersecurity survey</article-title>. <source>J. Comput. Inf. Syst.</source> <volume>64</volume>, <fpage>820</fpage>&#x2013;<lpage>834</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08874417.2023.2251452</pub-id></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hussain</surname><given-names>Z.</given-names></name></person-group> (<year>2017</year>). A user friendly security framework for the protection of confidential information. Available online at: <ext-link xlink:href="https://www.researchgate.net/publication/317040838" ext-link-type="uri">https://www.researchgate.net/publication/317040838</ext-link> (Accessed November 20, 2025).</mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jamil</surname><given-names>H.</given-names></name> <name><surname>Zia</surname><given-names>T.</given-names></name> <name><surname>Nayeem</surname><given-names>T.</given-names></name> <name><surname>Whitty</surname><given-names>M. T.</given-names></name> <name><surname>D&#x2019;Alessandro</surname><given-names>S.</given-names></name></person-group> (<year>2025</year>). <article-title>Human-centric cyber security: applying protection motivation theory to analyse micro business owners&#x2019; security behaviours</article-title>. <source>Inf. Comput. Secur.</source> <volume>33</volume>, <fpage>49</fpage>&#x2013;<lpage>76</lpage>. doi: <pub-id pub-id-type="doi">10.1108/ICS-10-2023-0176</pub-id></mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Jethava</surname><given-names>G.</given-names></name> <name><surname>Shukla</surname><given-names>N.</given-names></name> <name><surname>Chauhan</surname><given-names>D.</given-names></name> <name><surname>Patel</surname><given-names>K.</given-names></name></person-group> (<year>2025</year>). <chapter-title>Defending the digital frontier: a user-friendly cybersecurity toolkit</chapter-title>. <conf-name>Proceedings of International Conference on Computational Intelligence and Data Engineering: ICCIDE 2024</conf-name>, (Singapore: Springer Nature Singapore), <fpage>243</fpage>.</mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kamm&#x00FC;ller</surname><given-names>F.</given-names></name></person-group> (<year>2018</year>). <source>Human centric security and privacy for the IoT using formal techniques</source>. London, UK.</mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Kamm&#x00FC;ller</surname><given-names>F.</given-names></name> <name><surname>Augusto</surname><given-names>J. C.</given-names></name> <name><surname>Jones</surname><given-names>S.</given-names></name></person-group> (<year>2017</year>). &#x201C;<chapter-title>Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle</chapter-title>&#x201D; in <source>In 2017 IEEE 15th international conference on software engineering research, management and applications (SERA)</source> (UK: <publisher-name>IEEE</publisher-name>), <fpage>401</fpage>&#x2013;<lpage>406</lpage>.</mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kassicieh</surname><given-names>S.</given-names></name> <name><surname>Lipinski</surname><given-names>V.</given-names></name> <name><surname>Seazzu</surname><given-names>A. F.</given-names></name></person-group> (<year>2015</year>). <article-title>Human centric cyber security: what are the new trends in data protection?</article-title> <source>Portland Int. Conf. Manag. Eng. Technol.</source> <volume>2015</volume>, <fpage>1321</fpage>&#x2013;<lpage>1338</lpage>. doi: <pub-id pub-id-type="doi">10.1109/PICMET.2015.7273084</pub-id></mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kelechukwu</surname><given-names>O.</given-names></name> <name><surname>Ngugi</surname><given-names>J.</given-names></name> <name><surname>Sumbiri</surname><given-names>D.</given-names></name></person-group> (<year>2025</year>). <article-title>Human-centric cybersecurity training: examining the effectiveness of human-centric approaches to cybersecurity training compared to traditional methods, focusing on behavior change</article-title>. <source>J. Information Technol.</source> <volume>5</volume>, <fpage>51</fpage>&#x2013;<lpage>68</lpage>. doi: <pub-id pub-id-type="doi">10.70619/vol5iss12pp51-68-697</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Khadka</surname><given-names>K.</given-names></name> <name><surname>Ullah</surname><given-names>A. B.</given-names></name></person-group> (<year>2025</year>). <article-title>Human factors in cybersecurity: an interdisciplinary review and framework proposal</article-title>. <source>Int. J. Inf. Secur.</source> <volume>24</volume>, <fpage>1</fpage>&#x2013;<lpage>13</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10207-025-01032-0</pub-id></mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kioskli</surname><given-names>K.</given-names></name> <name><surname>Fotis</surname><given-names>T.</given-names></name> <name><surname>Nifakos</surname><given-names>S.</given-names></name> <name><surname>Mouratidis</surname><given-names>H.</given-names></name></person-group> (<year>2023</year>). <article-title>The importance of Conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0</article-title>. <source>Applied Sci.</source> <volume>13</volume>:3410. doi: <pub-id pub-id-type="doi">10.3390/app13063410</pub-id></mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Klein</surname><given-names>J.</given-names></name> <name><surname>Hossain</surname><given-names>K.</given-names></name></person-group> (<year>2020</year>). <article-title>Conceptualising human-centric cyber security in the Arctic in light of digitalisation and climate change</article-title>. <source>Arctic Review Law Politics</source> <volume>11</volume>, <fpage>1</fpage>&#x2013;<lpage>18</lpage>. doi: <pub-id pub-id-type="doi">10.2307/48710620</pub-id></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kurdi</surname><given-names>M. H.</given-names></name> <name><surname>Denden</surname><given-names>M.</given-names></name> <name><surname>Paul</surname><given-names>D.</given-names></name></person-group> (<year>2024</year>). <article-title>A study on the challenges of human-centric cyber-security and the guarantee of information quality</article-title>. <source>J. Inf. Secur.</source> <volume>15</volume>, <fpage>218</fpage>&#x2013;<lpage>231</lpage>. doi: <pub-id pub-id-type="doi">10.4236/jis.2024.152013</pub-id></mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Lakshmisree</surname><given-names>C. S.</given-names></name></person-group> (<year>2016</year>). <source>A biometrics based user-centric authentication approach for user friendly security system</source> <italic>IJARBEST</italic> 2, 885&#x2013;895.</mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Leavitt</surname><given-names>H. J.</given-names></name></person-group> (<year>1964</year>). <source>Applied organization change in industry: Structural</source>. <publisher-loc>And</publisher-loc>: <publisher-name>Technical</publisher-name>.</mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Magramo</surname><given-names>K.</given-names></name></person-group> (<year>2024</year>). <source>British engineering giant Arup revealed as 25 million deepfake scam victim</source>. Atlanta, GA, USA: <publisher-name>CNN Business</publisher-name> May, 17.</mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Marino</surname><given-names>V.</given-names></name></person-group> (<year>2023</year>). <source>User-friendly security automation for Domotic networks</source>. (Doctoral dissertation, Politecnico di Torino).</mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mohammed</surname><given-names>S. A.</given-names></name></person-group> (<year>2025</year>). <article-title>Human-centric cybersecurity: addressing insider threats with behavior analytics</article-title>. <source>Archiv</source>. 104&#x2013;113. doi: <pub-id pub-id-type="doi">10.25215/9371838892.12</pub-id></mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Moher</surname><given-names>D.</given-names></name> <name><surname>Liberati</surname><given-names>A.</given-names></name> <name><surname>Tetzlaff</surname><given-names>J.</given-names></name> <name><surname>Altman</surname><given-names>D. G.</given-names></name></person-group> (<year>2009</year>). <article-title>Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement</article-title>. <source>BMJ</source> <volume>339</volume>. doi: <pub-id pub-id-type="doi">10.1136/bmj.b2535</pub-id></mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mohurle</surname><given-names>S.</given-names></name> <name><surname>Patil</surname><given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>A brief study of wannacry threat: ransomware attack 2017</article-title>. <source>Int. J. Adv. Res. Comput. Sci.</source> <volume>8</volume>, 1938&#x2013;1940.</mixed-citation></ref>
<ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Morgan</surname><given-names>P. L.</given-names></name> <name><surname>Asquith</surname><given-names>P. M.</given-names></name> <name><surname>Bishop</surname><given-names>L. M.</given-names></name> <name><surname>Raywood-Burke</surname><given-names>G.</given-names></name> <name><surname>Wedgbury</surname><given-names>A.</given-names></name> <name><surname>Jones</surname><given-names>K.</given-names></name></person-group> (<year>2020</year>). <article-title>A new hope: human-centric cybersecurity research embedded within organizations</article-title>. <source>International Conference on Human-Computer Interaction</source>, <fpage>206</fpage>&#x2013;<lpage>216</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-030-50309-3_14</pub-id></mixed-citation></ref>
<ref id="ref46"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Muhudin Hilowle</surname><given-names>M.</given-names></name></person-group> (<year>2023</year>). <source>National Digital Identity Systems: A perspective of human-centric National Digital Identity Systems: A perspective of human-centric cybersecurity cybersecurity AUTHOR(S)</source>, vol. <volume>64</volume>, <fpage>820</fpage>&#x2013;<lpage>834</lpage> doi: <pub-id pub-id-type="doi">10.1080/08874417.2023.2251452</pub-id>.</mixed-citation></ref>
<ref id="ref47"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Narayanan</surname><given-names>A.</given-names></name> <name><surname>Srinivasan</surname><given-names>S.</given-names></name></person-group> (<year>2025</year>). &#x201C;<chapter-title>Human-centric cybersecurity methods in financial services: employ behavioral analytics in the face of credential theft, phishing, and social engineering</chapter-title>&#x201D; in <source>2025 IEEE 5th international conference on ICT in business industry \&#x0026; government (Indore, India: ICTBIG)</source>, <fpage>1</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref48"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ozkan Ozen</surname><given-names>Y. D.</given-names></name> <name><surname>Ozbiltekin Pala</surname><given-names>M.</given-names></name> <name><surname>Ayranci</surname><given-names>G.</given-names></name></person-group> (<year>2024</year>). <article-title>Evaluating human-centric cyber security risks in the manufacturing industry</article-title>. <source>Int. J. Manuf. Res.</source> <volume>19</volume>, 322&#x2013;337. doi: <pub-id pub-id-type="doi">10.1504/ijmr.2024.10068139</pub-id></mixed-citation></ref>
<ref id="ref49"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Paljug</surname><given-names>K.</given-names></name> <name><surname>Mikac</surname><given-names>R.</given-names></name></person-group> (<year>2020</year>). Contemporary crises: Case study of UBER. Contemporary Macedonian Defence/Sovremena Makedonska Odbrana, 20, 93&#x2013;106.</mixed-citation></ref>
<ref id="ref50"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ra</surname><given-names>G.</given-names></name> <name><surname>Kim</surname><given-names>T.</given-names></name> <name><surname>Lee</surname><given-names>I.</given-names></name></person-group> (<year>2021</year>). <article-title>VAIM: verifiable anonymous identity Management for Human-Centric Security and Privacy in the internet of things</article-title>. <source>IEEE Access</source> <volume>9</volume>, <fpage>75945</fpage>&#x2013;<lpage>75960</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2021.3080329</pub-id></mixed-citation></ref>
<ref id="ref51"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Rahman</surname><given-names>T.</given-names></name> <name><surname>Rohan</surname><given-names>R.</given-names></name> <name><surname>Pal</surname><given-names>D.</given-names></name> <name><surname>Kanthamanon</surname><given-names>P.</given-names></name></person-group> (<year>2021</year>). &#x201C;<chapter-title>Human factors in cybersecurity: a scoping review</chapter-title>&#x201D; in <source>Proceedings of the 12th international conference on advances in information technology</source>. (United States: Association of Computing Machinery New York), <fpage>1</fpage>&#x2013;<lpage>11</lpage>.</mixed-citation></ref>
<ref id="ref52"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Rao</surname><given-names>Z. F.</given-names></name></person-group> (<year>2024</year>). <source>Human-centric cybersecurity: Safeguarding individuals in the digital age</source>. Scotland (Master thesis): University of Glasgow.</mixed-citation></ref>
<ref id="ref53"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rishiwal</surname><given-names>V.</given-names></name> <name><surname>Agarwal</surname><given-names>U.</given-names></name> <name><surname>Alotaibi</surname><given-names>A.</given-names></name> <name><surname>Tanwar</surname><given-names>S.</given-names></name> <name><surname>Yadav</surname><given-names>P.</given-names></name> <name><surname>Yadav</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>Exploring secure V2X communication networks for human-centric security and privacy in smart cities</article-title>. <source>IEEE Access</source> <volume>12</volume>, <fpage>138763</fpage>&#x2013;<lpage>138788</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ACCESS.2024.3467002</pub-id></mixed-citation></ref>
<ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rohan</surname><given-names>R.</given-names></name> <name><surname>Funilkul</surname><given-names>S.</given-names></name> <name><surname>Pal</surname><given-names>D.</given-names></name> <name><surname>Thapliyal</surname><given-names>H.</given-names></name></person-group> (<year>2021</year>). <article-title>Humans in the loop: cybersecurity aspects in the consumer IoT context</article-title>. <source>IEEE Consumer Electronics Magazine</source> <volume>11</volume>, <fpage>78</fpage>&#x2013;<lpage>84</lpage>. doi: <pub-id pub-id-type="doi">10.1109/MCE.2021.3095385</pub-id></mixed-citation></ref>
<ref id="ref55"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Rothenberg</surname><given-names>E</given-names></name></person-group>. (<year>2023</year>). CNN. Tesla begins notifying workers who were affected by data breach. Available online at: <ext-link xlink:href="https://edition.cnn.com/2023/08/19/business/tesla-data-breach-employee-personal-info" ext-link-type="uri">https://edition.cnn.com/2023/08/19/business/tesla-data-breach-employee-personal-info</ext-link> (Accessed October 10, 2025).</mixed-citation></ref>
<ref id="ref56"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Ryan</surname><given-names>P. Y. A.</given-names></name></person-group> (<year>2025</year>). Designing Human-centric security protocols. In: Morogan, L., Roenne, P., Bica, I. (eds) Innovative Security Solutions for Information Technology and Communications. SecITC 2024. <italic>Lecture Notes in Computer Science</italic>. (Cham: Springer), 15595. doi: <pub-id pub-id-type="doi">10.1007/978-3-031-87760-5_1</pub-id></mixed-citation></ref>
<ref id="ref57"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll4">Salinas</collab></person-group>. (<year>2025</year>). <chapter-title>Case No</chapter-title>. 22-cv-04823. District Court for the Northern District of California. Available online at: <ext-link xlink:href="https://cashappsecuritysettlement.com/" ext-link-type="uri">https://cashappsecuritysettlement.com/</ext-link> (Accessed December 1, 2025).</mixed-citation></ref>
<ref id="ref58"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Schneier</surname><given-names>B.</given-names></name></person-group> (<year>2015</year>). <source>Secrets and lies: Digital security in a networked world</source>. USA: <publisher-name>John Wiley &#x0026; Sons</publisher-name>.</mixed-citation></ref>
<ref id="ref59"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Tabari</surname><given-names>A. Z.</given-names></name></person-group> (<year>2021</year>). <article-title>Human-centric cybersecurity research: from trapping the bad guys to helping the good ones</article-title> (Doctoral dissertation, University of South Florida). Available online at: <ext-link xlink:href="https://digitalcommons.usf.edu/etd" ext-link-type="uri">https://digitalcommons.usf.edu/etd</ext-link> (Accessed November 20, 2025).</mixed-citation></ref>
<ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tambe-Jagtap</surname><given-names>S. N.</given-names></name></person-group> (<year>2023</year>). <article-title>Human-centric cybersecurity: understanding and mitigating the role of human error in cyber incidents</article-title>. <source>SHIFRA</source> <volume>2023</volume>, <fpage>53</fpage>&#x2013;<lpage>59</lpage>. doi: <pub-id pub-id-type="doi">10.70470/shifra/2023/007</pub-id></mixed-citation></ref>
<ref id="ref61"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll5">Tamzid</collab></person-group>. (<year>2025</year>). 250+ Cybercrime Statistics for 2025. Available online at: <ext-link xlink:href="https://www.brightdefense.com/resources/cybercrime-statistics/#pp-toc-nd0c5lfqet8g-anchor-9" ext-link-type="uri">https://www.brightdefense.com/resources/cybercrime-statistics/#pp-toc-nd0c5lfqet8g-anchor-9</ext-link></mixed-citation></ref>
<ref id="ref62"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tari</surname><given-names>Z.</given-names></name> <name><surname>Mahmud</surname><given-names>R.</given-names></name></person-group> (<year>2025</year>). <article-title>Augmenting digital ecosystem resilience through human-centric cybersecurity solutions</article-title>. <source>IEEE Trans. Eng. Manag.</source> 72, 3892&#x2013;3908. doi: <pub-id pub-id-type="doi">10.1109/TEM.2025.3606637</pub-id></mixed-citation></ref>
<ref id="ref63"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Troublefield</surname><given-names>T. C.</given-names></name></person-group> (<year>2025</year>). <article-title>The Cyberpsychology of small and medium-sized enterprises cybersecurity: a human-centric approach to policy development</article-title>. <source>J. Inf. Secur.</source> <volume>16</volume>, <fpage>158</fpage>&#x2013;<lpage>183</lpage>. doi: <pub-id pub-id-type="doi">10.4236/jis.2025.161009</pub-id></mixed-citation></ref>
<ref id="ref64"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>van der Kleij</surname><given-names>R.</given-names></name> <name><surname>Van Hemert</surname><given-names>D.</given-names></name> <name><surname>Te Paske</surname><given-names>B. J.</given-names></name> <name><surname>Rooijakkers</surname><given-names>T.</given-names></name></person-group> (<year>2024</year>). <article-title>Human-centric security engineering: towards a research agenda</article-title>. <source>Hum. Factors Des. Eng. Comput</source> <volume>159</volume>, <fpage>8</fpage>&#x2013;<lpage>10</lpage>. doi: <pub-id pub-id-type="doi">10.54941/ahfe1005596</pub-id></mixed-citation></ref>
<ref id="ref65"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>L.</given-names></name></person-group> (<year>2024</year>). &#x201C;<chapter-title>Investigation on human-centric security based on understanding the role of user behavior in information security</chapter-title>&#x201D; in <source>2024 international conference on electronics and devices, computational science (ICEDCS)</source>, <fpage>1115</fpage>&#x2013;<lpage>1122</lpage>. IEEE.</mixed-citation></ref>
<ref id="ref66"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhou</surname><given-names>S.</given-names></name> <name><surname>Wang</surname><given-names>Y.</given-names></name></person-group> (<year>2025</year>). <article-title>Build a human-centric maritime transportation cybersecurity protection system based on MARITIME</article-title>. <source>International Journal of Advanced AI Applications</source> <volume>1</volume>, <fpage>1</fpage>&#x2013;<lpage>28</lpage>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1498925/overview">Saqib Saeed</ext-link>, Imam Abdulrahman Bin Faisal University, Saudi Arabia</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2999327/overview">Hewa Majeed Zangana</ext-link>, University of Duhok, Iraq</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3071117/overview">Prasetyo Adi Wibowo Putro</ext-link>, Politeknik Siber dan Sandi Negara, Indonesia</p>
</fn>
</fn-group>
</back>
</article>