A systematic review of multi perspectives on human cybersecurity behavior

RA Alsharida, BAS Al-rimy, M Al-Emran, A Zainal - Technology in society, 2023 - Elsevier
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …

Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities

LW Wong, VH Lee, GWH Tan, KB Ooi… - International Journal of …, 2022 - Elsevier
This paper investigates the role of general cybersecurity and cybersecurity policy awareness
in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …

Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails

M Butavicius, R Taib, SJ Han - Computers & Security, 2022 - Elsevier
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are
commonly cited as cues of deception that people can use to identify phishing emails …

A systematic synthesis of critical success factors for cybersecurity

W Yeoh, S Wang, A Popovič, NH Chowdhury - Computers & Security, 2022 - Elsevier
Extant studies suggest that cybersecurity is critical and among the IT spending priorities of
organizations. In response, the literature draws attention to the cybersecurity critical success …

Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures

NH Chowdhury, MTP Adam, T Teubner - Computers & Security, 2020 - Elsevier
Cybersecurity is a growing concern for private individuals and professional entities. Reports
have shown that the majority of cybersecurity incidents occur because users fail to behave …

Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

An empirical study on impulse consumption intention of livestreaming e-commerce: the mediating effect of flow experience and the moderating effect of time pressure

W Dong, Y Wang, J Qin - Frontiers in Psychology, 2023 - frontiersin.org
Based on the Stimulus-Organism-Response (SOR) model, this paper studies the impulsive
consumption mechanism of consumers participating in livestreaming e-commerce from the …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …