Building a thematic framework of cybersecurity: a systematic literature review approach

TY Khaw, A Amran, AP Teoh - Journal of Systems and Information …, 2024 - emerald.com
Purpose This paper aims to explore the factors affecting cybersecurity implementation in
organizations in various countries and develop a cybersecurity framework to improve …

Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)

VO Kayhan, M Agrawal, S Shivendu - Decision Support Systems, 2023 - Elsevier
The cyber security industry is rapidly adopting threat hunting as a proactive tool for early and
faster detection of suspected malicious actors. In this paper, we propose a machine learning …

Unveiling the process of phishing precautions taking: The moderating role of optimism bias

W Lei, S Hu, C Hsu - Computers & Security, 2023 - Elsevier
Phishing has emerged as a critical security threat to individuals and organizations.
Academics and practitioners have developed various methods to convince individuals to …

Perceived Contextual Use Questionnaire: An Instrument for Measuring Contextual Use of Mobile Social Media

DB Köse - Available at SSRN 4753474, 2024 - papers.ssrn.com
This study conceptualizes and develops psychometric scales to measure users' perceived
contextual use (PCU) of mobile social media in prominent use situations. Measuring users' …

Improving social engineering resilience in enterprises

RAB Ribeiro - 2024 - repositorioaberto.uab.pt
Social Engineering is a significant problem for enterprises. Cybercriminals continue
developing new and sophisticated methods to trick individuals into disclosing confidential …

The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design …

X Chen, M Sacré, G Lenzini, S Greiff, V Distler… - arXiv preprint arXiv …, 2024 - arxiv.org
Organizations rely on phishing interventions to enhance employees' vigilance and safe
responses to phishing emails that bypass technical solutions. While various resources are …

Navigating the Landscape of IT Threats: A Literature Review and the Road Ahead

M Meier - 2024 - aisel.aisnet.org
Users face various information technology (IT) threats in their daily lives. They affect users by
evoking emotions such as fear and require them to engage in behaviors such as changing …

Same or Not the Same? Comparison Between Employees Prone to Overplacement, Overestimation, and Overprecision in Information Security

M Frank, M Wacker, LM Ranft - 2024 - scholarspace.manoa.hawaii.edu
Overconfidence has been shown to have a detrimental effect on information security in
enterprises. However, research on this systematic misperception of one's abilities and skills …

An Analysis of Phishing Susceptibility Through the Lens of Protection Motivation Theory

R Rudi - 2023 - uia.brage.unit.no
Users of communication tools are vulnerable to a cyberattack called phishing which aims to
trick a recipient into giving away information or access that the attacker should not have …

[HTML][HTML] Социально-культурные риски «больших пользовательских данных» российских граждан

ПГ Былевский - Человек и культура, 2023 - cyberleninka.ru
Предметом исследования являются современные социально-культурные риски
граждан России как пользователей компьютерно-телекоммуникационных технологий и …