The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

Fiends and fools: a narrative review and neo-socioanalytic perspective on personality and insider threats

AR Marbut, PD Harms - Journal of Business and Psychology, 2024 - Springer
Insider threats represent a serious threat to organizations but are considered to be difficult to
predict and prevent. Although a growing body of research has examined personological …

[HTML][HTML] VISTA: An inclusive insider threat taxonomy, with mitigation strategies

K Renaud, M Warkentin, G Pogrebna… - Information & …, 2024 - Elsevier
Insiders have the potential to do a great deal of damage, given their legitimate access to
organisational assets and the trust they enjoy. Organisations can only mitigate insider …

Generation and deployment of honeytokens in relational databases for cyber deception

N Prabhaker, GS Bopche, M Arock - Computers & Security, 2024 - Elsevier
Despite considerable investments in database security, global statistics indicate an
exponential increase in data breaches. Organizations are often unaware of data breaches …

[Retracted] Research on Sports Training Decision Support System Based on Improved Association Rules Algorithm

L Shao - Security and Communication Networks, 2021 - Wiley Online Library
In my country, college students' physical exercise is mainly through physical exercise and
amateur sports, which is basically in a state of disorder. Based on the improved association …

[PDF][PDF] Dark traits and hacking potential

J Gaia, G Sanders, S Sanders, S Upadhyaya… - Journal of …, 2021 - par.nsf.gov
This paper investigates the psychological traits of individuals' attraction to engaging in
hacking behaviors (both ethical and illegal/unethical) upon entering the workforce. A new …

An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour

K Padayachee - Information & Computer Security, 2024 - emerald.com
Purpose This investigation serves a dual purpose: providing preliminary results and serving
as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study …

[HTML][HTML] Towards projection of the individualised risk assessment for the cybersecurity workforce

A Brilingaitė, L Bukauskas, I Domarkienė… - Computer Standards & …, 2025 - Elsevier
In the era of global digitalisation, there is rapid development of services requiring
cybersecurity resilience against adversarial actions. The demand for skilled cybersecurity …

Does e-government development moderate the impact of female labor participation on national cybersecurity maturity? An empirical investigation

M Dev, D Saha - Information & Computer Security, 2024 - emerald.com
Purpose This paper aims to investigate the relationship of female participation in labor force
with the cybersecurity maturity of nations and the enabling role of e-government …

Understanding and Decreasing Security Breaches in the Healthcare Industry: A Qualitative Case Study Exploring Network-Connected Medical Devices in a Large …

DN Jones - 2022 - search.proquest.com
The healthcare industry and electronic health records continues to be a main target of
cybercriminals. Healthcare security managers are faced with the difficult task of providing …