A multitude of studies have suggested potential factors that influence internet security awareness (ISA). Some, for example, used GDP and nationality to explain different ISA …
At present, with the rise of information technology revolution, such as mobile internet, cloud computing, big data, machine learning, artificial intelligence, and the Internet of Things, the …
Q An, WCH Hong, XS Xu, Y Zhang… - International Journal of …, 2023 - Springer
During the pandemic, the prevailing online learning has brought tremendous benefits to the education field. However, it has also become a target for cybercriminals. Cybersecurity …
Organisations and security professionals design Security Education, Training, and Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …
Data breaches have become a formidable challenge for business operations in the twenty- first century. The emergence of big data in the ever-growing digital economy has created the …
AR Gillam, WT Foster - Computers in Human Behavior, 2020 - Elsevier
Behavioral determinants of cybersecurity have gained greater attention among information technology experts in recent years. However, drivers of risky cybersecurity behavior have …
M Butavicius, K Parsons, M Lillie, A McCormac… - Computers & …, 2020 - Elsevier
While technical controls can reduce vulnerabilities to cyber threats, no technology provides absolute protection and we hypothesised that people may act less securely if they place …
Organisational information and data must be protected from active and passive attacks and secured from illegal access, unwanted interruption, unauthorised alteration or annihilation …
Information is a valuable resource that organization may utilize in the current business environment. It is critical to comprehend the importance of information protection, as it …