Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human …
This paper investigates the role of general cybersecurity and cybersecurity policy awareness in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the …
M Butavicius, R Taib, SJ Han - Computers & Security, 2022 - Elsevier
Lack of personalisation and poor mechanics (eg, grammar, spelling and punctuation) are commonly cited as cues of deception that people can use to identify phishing emails …
Extant studies suggest that cybersecurity is critical and among the IT spending priorities of organizations. In response, the literature draws attention to the cybersecurity critical success …
Cybersecurity is a growing concern for private individuals and professional entities. Reports have shown that the majority of cybersecurity incidents occur because users fail to behave …
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and employees' lives makes it a challenge to ensure adherence to security policy. In such …
W Dong, Y Wang, J Qin - Frontiers in Psychology, 2023 - frontiersin.org
Based on the Stimulus-Organism-Response (SOR) model, this paper studies the impulsive consumption mechanism of consumers participating in livestreaming e-commerce from the …
NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades. This includes studies being carried out at the primary as well as secondary levels. There are …
H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the scope of cybersecurity research topics. This paper proposes a grouping and classifications …