[HTML][HTML] A systematic analysis of failures in protecting personal health data: a scoping review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

[PDF][PDF] Dark traits and hacking potential

J Gaia, G Sanders, S Sanders, S Upadhyaya… - Journal of …, 2021 - par.nsf.gov
This paper investigates the psychological traits of individuals' attraction to engaging in
hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new …

An Extensive Evaluation of New Federated Learning Approaches for COVID-19 Identification

R Barua, S Datta - Pioneering Smart Healthcare 5.0 with IoT …, 2024 - igi-global.com
Abstract The World Health Organization (WHO) proclaimed the coronavirus of 2019 (COVID-
19) a global pandemic in March 2020. Effective testing is essential to stop the epidemic from …

The interaction of dark traits with the perceptions of apprehension

J Gaia, D Murray, G Sanders, S Sanders, S Upadhyaya… - 2022 - aisel.aisnet.org
This paper integrates dark personality traits with the economics of crime and rational choice
theories to identify the role that the Dark Triad and thrill-seeking have on the perceptions of …

Scp-bp Framework: Situational Crime Prevention for Managing Data Breaches in Business Processes

C Miao, H Ho, E Tsen, J Gilmour, RKL Ko - International Conference on …, 2024 - Springer
From a 'people, process and technology'viewpoint, the most overlooked area for
organisational cybercrime prevention is the 'process' component. While there is an increase …

Primary and Secondary Control as Antecedents to the Dark Traits in Predicting Attraction to Hacking Behavior

L Amo, J Gaia, D Murray, GL Sanders… - Journal of …, 2023 - articlearchives.co
The current study examines the relationship between the need for control, the Dark Triad
personality traits, and hacking intent. We surveyed 523 individuals using a scenario design …

[PDF][PDF] Economic Incentives and Perceptions as Critical Factors for Understanding Insider Hacking Behavior.

L Amo, J Gaia, D Murray, G Sanders… - …, 2024 - scholarspace.manoa.hawaii.edu
The objective of this research is to investigate the influence of interest in white hat
capabilities, income levels, and perceptions of being apprehended on the willingness to …

[图书][B] Business Process Management: 22nd International Conference, BPM 2024, Krakow, Poland, September 1–6, 2024, Proceedings

A Marrella, M Resinas, M Jans, M Rosemann - 2024 - books.google.com
This book constitutes the refereed proceedings of the 22nd International Conference on
Business Process Management, BPM 2024, which took place in Krakow, Poland, in …

Integrating Criminological Theories in Cybersecurity Risk Assessment: A Study of the TRACI Framework's Application to Critical Infrastructure

CS Martin - 2024 - search.proquest.com
This dissertation explores the application of the Taxonomy for Risk Assessment of
Cyberattacks on Critical Infrastructure (TRACI) framework, a tool designed to systematically …

Dark Traits and Hacking Potential

GL Sanders - Gaia, J., Sanders, GL, Sanders, SP, Upadhyaya, S …, 2021 - papers.ssrn.com
This paper investigates the psychological traits of individuals' attraction to engaging in
hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new …