[HTML][HTML] A typology of cybersecurity behavior among knowledge workers

D Baltuttis, T Teubner, MTP Adam - Computers & Security, 2024 - Elsevier
While the cybersecurity literature on behavioral factors has expanded, current
countermeasures often overlook employee-specific behavioral differences, leading to …

Social media continuance from the perspective of commitment

H Mohit, VL Johnson… - Journal of Computer …, 2023 - Taylor & Francis
Social network services (SNSs) have attracted more than 4.3 billion users worldwide.
However, many feel SNSs have had an overall negative impact on society. This study …

Exploring Defensive Security Strategies It Leaders Need to Safeguard Their Information Assets in Private Higher Education: A Qualitative Study

S Steelman - 2024 - search.proquest.com
Private higher educational institutions are at a high risk of cyber-attacks based on the
amount of data they consume about students, their families, donors, faculty, and employees …

An analysis of differences in behaviors and practices of security-conscious users and regular users on mobile devices

S Mujeye - Information & Computer Security, 2023 - emerald.com
Purpose This study aims to investigate the differences in security-conscious (group A) and
regular (group B) users' behaviors and practices on mobile devices. Design/methodology …

BANKS SHORT MESSAGE SERVICE THREATS NOTIFICATION SYSTEM ON ANDROID BASED PHONE

I umar Muhammad, MM Liman, J Abah… - FUDMA JOURNAL …, 2024 - fjs.fudutsinma.edu.ng
This research is carried out for the development and implementation of an end-to-end
encrypted Short Message Service (SMS) App, utilizing a hybrid cipher algorithm, driven by …

Perceptions of IT Decision-Makers Regarding Adopting Information Security Controls for BYOD in Healthcare

K Beucler - 2024 - search.proquest.com
This research paper explored the perceptions of IT decision-makers regarding their adoption
of information security controls for Bring Your Own Device (BYOD) in healthcare. The study …

Securing Mobile Workspaces in the Cloud: Navigating Bring Your Own Device Challenges with Cyber Resilience

HV Srikrishna, JS Murthy - Cloud Security, 2024 - taylorfrancis.com
In the realm of Cloud Bring Your Own Device (BYOD) security, organizations are proactively
addressing past failures through strategic mitigations. Comprehensive user training and …

The New Reality at Work: An Employee Typology of Cybersecurity Behavior

D Baltuttis, T Teubner, M Adam - Available at SSRN 4547047 - papers.ssrn.com
In recent years, cybersecurity vulnerability has emerged as one of the most urgent business
risks globally. As a major risk factor in this regards, employees' behavior is often considered …