Z Yan, Y Xue, Y Lou - Computers in Human Behavior, 2021 - Elsevier
K-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying both risk factors and protective factors associated with intuitive and rational judgment of …
CAR Hoare, J He - Information Processing Letters, 1987 - dl.acm.org
The weakest prespecification | Information Processing Letters skip to main content ACM Digital Library home ACM home Google, Inc. (search) Advanced Search Browse About Sign in …
I Arpaci, K Sevinc - Information Development, 2022 - journals.sagepub.com
This study aimed to develop a cybersecurity scale to measure individuals' practices and perceptions regarding cybersecurity. The study tested psychometric properties of the …
R Wash, E Rader - Proceedings of the 2011 New Security Paradigms …, 2011 - dl.acm.org
Over 80 million households in the United States have a home computer and an Internet connection. The vast majority of these are administered by people who have little computer …
AT Shappie, CA Dawson, SM Debb - Psychology of Popular Media, 2020 - psycnet.apa.org
Personality may better predict cybersecurity behavior relative to an individual's stated intentions; however, people often behave in ways that are discordant with what they intend …
M Dodel, G Mesch - Computers & Security, 2019 - Elsevier
As Internet access and use have become ubiquitous, cyber-safety behaviors are a major aspect of individuals' well-being and a matter of concern for national cyber-security officials …
G Parekh, D DeLatte, GL Herman… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These …
We developed a simulation game to study the effectiveness of decision-makers in overcoming two complexities in building cybersecurity capabilities: potential delays in …