Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Cybersecurity Education and Awareness among Parents and Teachers: A Survey of Bahrain

M Ayyash, T Alsboui, O Alshaikh, I Inuwa-Dute… - IEEE …, 2024 - ieeexplore.ieee.org
In today's interconnected and digital world, the need to safeguard sensitive and personal
information is vital. The rise in cybercrime, especially that involving minors and vulnerable …

An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset

F Javadnejad, AM Abdelmagid, CA Pinto… - Enterprise Information …, 2024 - Taylor & Francis
This study comprehensively assesses ransomware/malware risks using the Advisen cyber
loss dataset. It classifies malware types by frequency and financial impact, revealing that low …

A Comprehensive Review-Building A Secure Social Media Environment for Kids-Automated Content Filtering with Biometric Feedback

PV Kishorchandra, B Vadher… - International …, 2024 - ijircst.irpublications.org
This review paper is all about how important it is to use smart technology to keep kids safe
on social media while helping them learn better. By adding things like better controls for …

Revamping Advocacy for the Digital Age: Approaches for Nurturing Survivor-Centered Digital Resiliency

HL Storer, LB Gezinski, T Shulruff, A Malorni… - Journal of Family …, 2024 - Springer
Purpose Despite the myriad benefits associated with accessing digital technologies, there
has been considerable concern regarding the prevalence of digital dating abuse (DDA) in …

[HTML][HTML] An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks

F Alotaibi, RK Karne, AL Wijesinha… - … of Cybersecurity and …, 2024 - mdpi.com
The Internet has become the primary vehicle for doing almost everything online, and
smartphones are needed for almost everyone to live their daily lives. As a result …

Protecting Children's Data from Cybersecurity Attacks to Prevent Child Sexual Abuse: A Techno-Legal Approach

S Gupta, S Kumari, U Sugandh - … International Conference on …, 2023 - ieeexplore.ieee.org
The increasing technological advancements and interconnectedness in today's world have
created a parallel digital realm for children to connect, learn, and communicate. However …

Cybersecurity beyond the screen: tackling online harassment and cyberbullying

SB Rathod, AG Khandizod… - AI Tools and Applications …, 2024 - igi-global.com
In our digitally connected world, the chapter takes a holistic approach to combat the
pervasive challenges of online harassment and cyberbullying. These issues extend beyond …

Fostering inclusive welfare and Islamic financing through Islamic social finance digitalization strategy

F Syarifuddin - Edelweiss Applied Science and Technology, 2024 - learning-gate.com
Islamic Social Finance (ISF) is one solution for poverty alleviation, which is a major concern
in developing countries like Indonesia. However, the performance of ISF in Indonesia, both …

YouTube Üzerinden Çocukluğun Yok Oluşuna Bir Örnek:“Kısmetse Olur” Programı

H Özgür, A Eskicumalı - Recep Tayyip Erdoğan Üniversitesi Sosyal …, 2023 - dergipark.org.tr
Yeni iletişim teknolojileri sayesinde sosyal yaşam hızla dönüşmektedir. Dijitalleşmenin
zirveye ulaştığı günümüzde, ekrana maruz kalma yaşı giderek düşerken, ekran karşısında …