The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model

NF Khan, N Ikram, H Murtaza, M Javed - Computers & Security, 2023 - Elsevier
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in developing …

Systematic literature reviews in cyberbullying/cyber harassment: A tertiary study

S Saleem, NF Khan, S Zafar, N Raza - Technology in Society, 2022 - Elsevier
A number of systematic literature reviews have been conducted in order to understand
cyberbullying phenomenon. Tertiary studies are carried out to provide a holistic view of an …

Digital hoarding and personal use digital data

E Sillence, JA Dawson, RD Brown… - Human–Computer …, 2023 - Taylor & Francis
ABSTRACT The problem of “Digital Hoarding” has been studied in a workplace context but
less so in relation to personal use digital data. In this study, we examine the relationship …

[HTML][HTML] Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory

U Kiran, NF Khan, H Murtaza, A Farooq… - Computers & …, 2025 - Elsevier
Context Protection motivation theory (PMT) is the most frequently used theory in
understanding cyber security behaviors. However, most studies have used a cross-sectional …

Design and evaluation of TPB based anti-bullying intervention for university students

S Saleem, NF Khan, S Zafar, M Ahmed - Multimedia Tools and …, 2024 - Springer
The presence of Cyberbullying (CB) phenomenon in university students reported in
literature highlights the need for an educational intervention. In this study, we use theory of …

Cyber harassment: hate speech with news spread hoax death via the tiktok account@ p********* a

S Narti, Y Yanto - The International Journal of Politics and …, 2023 - ijobsor.pelnus.ac.id
Social media TikTok is a means of communication for today's society. The content presented
on TikTok varies, from positive to negative, so it reaps a lot of comments from netizens …

Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach

NF Khan, H Murtaza, K Malik, M Mahmood… - … Technology & People, 2024 - emerald.com
Purpose This research aims to understand the smartphone security behavior using
protection motivation theory (PMT) and tests the current PMT model employing statistical …

[引用][C] Economics of Education and Digital Learning for Human Capital Development in Pakistan: A Critical Review

U Aijaz, KS Lodhi, MA Shamim, S Mughal - Qlantic Journal of Social Sciences, 2024