A systematic literature review of how cybersecurity-related behavior has been assessed

K Kannelønning, SK Katsikas - Information & Computer Security, 2023 - emerald.com
Purpose Cybersecurity attacks on critical infrastructures, businesses and nations are rising
and have reached the interest of mainstream media and the public's consciousness. Despite …

The influence of social education level on cybersecurity awareness and behaviour: A comparative study of university students and working graduates

WCH Hong, CY Chi, J Liu, YF Zhang, VNL Lei… - Education and …, 2023 - Springer
A multitude of studies have suggested potential factors that influence internet security
awareness (ISA). Some, for example, used GDP and nationality to explain different ISA …

How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates

Q An, WCH Hong, XS Xu, Y Zhang… - International Journal of …, 2023 - Springer
During the pandemic, the prevailing online learning has brought tremendous benefits to the
education field. However, it has also become a target for cybercriminals. Cybersecurity …

Reconceptualizing cybersecurity awareness capability in the data-driven digital economy

S Akter, MR Uddin, S Sajib, WJT Lee, K Michael… - Annals of operations …, 2022 - Springer
Data breaches have become a formidable challenge for business operations in the twenty-
first century. The emergence of big data in the ever-growing digital economy has created the …

The role of cue utilization in the detection of phishing emails

D Sturman, C Valenzuela, O Plate, T Tanvir, JC Auton… - Applied Ergonomics, 2023 - Elsevier
This study was designed to examine the roles of cue utilization, phishing features and time
pressure in the detection of phishing emails. During two experiments, participants completed …

Factors affecting risky cybersecurity behaviors by US workers: An exploratory study

AR Gillam, WT Foster - Computers in Human Behavior, 2020 - Elsevier
Behavioral determinants of cybersecurity have gained greater attention among information
technology experts in recent years. However, drivers of risky cybersecurity behavior have …

When believing in technology leads to poor cyber security: Development of a trust in technical controls scale

M Butavicius, K Parsons, M Lillie, A McCormac… - Computers & …, 2020 - Elsevier
While technical controls can reduce vulnerabilities to cyber threats, no technology provides
absolute protection and we hypothesised that people may act less securely if they place …

The effect of resilience and job stress on information security awareness

A McCormac, D Calic, K Parsons… - … & Computer Security, 2018 - emerald.com
Purpose The purpose of this study was to investigate the relationship between resilience,
job stress and information security awareness (ISA). The study examined the effect of …

Evaluation of teachers' information literacy based on information of behavioral data in online learning and teaching platforms: an empirical study of China

Y Li, C Zhou, D Wu, M Chen - Library Hi Tech, 2023 - emerald.com
Purpose Advances in information technology now permit the recording of massive and
diverse process data, thereby making data-driven evaluations possible. This study …

An analysis of assessment approaches and maturity scales used for evaluation of information security and cybersecurity user awareness and training programs: A …

K Muronga, M Herselman, A Botha… - 2019 conference on …, 2019 - ieeexplore.ieee.org
This study aimed to ascertain the types of approaches that are applied in the assessments of
information security and cybersecurity user awareness and training programs. The study …