Cybersecurity awareness in the context of the Industrial Internet of Things: A systematic literature review

A Corallo, M Lazoi, M Lezzi, A Luperto - Computers in Industry, 2022 - Elsevier
Cybersecurity is one of the main challenges faced by companies in the context of the
Industrial Internet of Things (IIoT), in which a number of smart devices associated with …

The influence of social education level on cybersecurity awareness and behaviour: A comparative study of university students and working graduates

WCH Hong, CY Chi, J Liu, YF Zhang, VNL Lei… - Education and …, 2023 - Springer
A multitude of studies have suggested potential factors that influence internet security
awareness (ISA). Some, for example, used GDP and nationality to explain different ISA …

Big data-driven banking operations: Opportunities, challenges, and data security perspectives

M Hasan, A Hoque, T Le - FinTech, 2023 - mdpi.com
At present, with the rise of information technology revolution, such as mobile internet, cloud
computing, big data, machine learning, artificial intelligence, and the Internet of Things, the …

How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates

Q An, WCH Hong, XS Xu, Y Zhang… - International Journal of …, 2023 - Springer
During the pandemic, the prevailing online learning has brought tremendous benefits to the
education field. However, it has also become a target for cybercriminals. Cybersecurity …

“Get a red-hot poker and open up my eyes, it's so boring” 1: Employee perceptions of cybersecurity training

A Reeves, D Calic, P Delfabbro - Computers & security, 2021 - Elsevier
Organisations and security professionals design Security Education, Training, and
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …

Reconceptualizing cybersecurity awareness capability in the data-driven digital economy

S Akter, MR Uddin, S Sajib, WJT Lee, K Michael… - Annals of operations …, 2022 - Springer
Data breaches have become a formidable challenge for business operations in the twenty-
first century. The emergence of big data in the ever-growing digital economy has created the …

Factors affecting risky cybersecurity behaviors by US workers: An exploratory study

AR Gillam, WT Foster - Computers in Human Behavior, 2020 - Elsevier
Behavioral determinants of cybersecurity have gained greater attention among information
technology experts in recent years. However, drivers of risky cybersecurity behavior have …

When believing in technology leads to poor cyber security: Development of a trust in technical controls scale

M Butavicius, K Parsons, M Lillie, A McCormac… - Computers & …, 2020 - Elsevier
While technical controls can reduce vulnerabilities to cyber threats, no technology provides
absolute protection and we hypothesised that people may act less securely if they place …

Developing an information security policy: A case study approach

FH Alqahtani - Procedia Computer Science, 2017 - Elsevier
Organisational information and data must be protected from active and passive attacks and
secured from illegal access, unwanted interruption, unauthorised alteration or annihilation …

Measuring organizational information security awareness in South Africa

E Kritzinger, A Da Veiga… - … Security Journal: A Global …, 2023 - Taylor & Francis
Information is a valuable resource that organization may utilize in the current business
environment. It is critical to comprehend the importance of information protection, as it …