Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review

S Kalhoro, M Rehman, V Ponnusamy… - IEEE Access, 2021 - ieeexplore.ieee.org
The advent of new technologies and the rapid growth of internet users have given birth to
the menace of cyber-crime. Unfortunately, it is increasing at an alarming pace. This situation …

A customer-centric view of E-commerce security and privacy

S Saeed - Applied Sciences, 2023 - mdpi.com
Business organizations have huge potential to increase their customer base by offering e-
commerce services, especially in the post-pandemic era. Ensuring secure e-commerce …

Analysis of personal information security behavior and awareness

G Öğütçü, ÖM Testik, O Chouseinoglou - Computers & Security, 2016 - Elsevier
Hardware and software security mechanisms are widely used to strengthen information
systems (IS) against attacks. However, these systems are still highly vulnerable to threats …

Taxonomy of information security risk assessment (ISRA)

A Shameli-Sendi, R Aghababaei-Barzegar… - Computers & …, 2016 - Elsevier
Abstract Information is a perennially significant business asset in all organizations.
Therefore, it must be protected as any other valuable asset. This is the objective of …

Cyber risk perception in the maritime domain: a systematic literature review

MH Larsen, MS Lund - IEEE Access, 2021 - ieeexplore.ieee.org
This paper aims to present an approach to investigate cyber risk perception with use of
recognized psychological models, and to give an overview of state-of-the-art research within …

The role of consumers' perceived security, perceived control, interface design features, and conscientiousness in continuous use of mobile payment services

J Zhang, Y Luximon, Y Song - Sustainability, 2019 - mdpi.com
Mobile payment has played a vital role in transforming traditional payment methods into
digital payment methods and has led to changes in consumers' behaviors in economic …

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness …

A Tsohou, M Karyda, S Kokolakis - Computers & security, 2015 - Elsevier
Standards and best practices for information security awareness programs focus on the
content and processes of the programs, without taking into consideration how individuals …

Risk perceptions of cyber-security and precautionary behaviour

P Van Schaik, D Jeske, J Onibokun, L Coventry… - Computers in Human …, 2017 - Elsevier
A quantitative empirical online study examined a set of 16 security hazards on the Internet
and two comparisons in 436 UK-and US students, measuring perceptions of risk and other …

Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia

S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …

Factors affecting perception of information security and their impacts on IT adoption and security practices

DL Huang, PLP Rau, G Salvendy, F Gao… - International Journal of …, 2011 - Elsevier
The gap between the perceived security of an information system and its real security level
can influence people'decisions and behavior. The objective of this study is to find effective …