The cybersecurity behavioral research: A tertiary study
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …
This includes studies being carried out at the primary as well as secondary levels. There are …
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in developing …
and awareness. However, there is lack of theoretical underpinnings in developing …
Systematic literature reviews in cyberbullying/cyber harassment: A tertiary study
A number of systematic literature reviews have been conducted in order to understand
cyberbullying phenomenon. Tertiary studies are carried out to provide a holistic view of an …
cyberbullying phenomenon. Tertiary studies are carried out to provide a holistic view of an …
Digital hoarding and personal use digital data
E Sillence, JA Dawson, RD Brown… - Human–Computer …, 2023 - Taylor & Francis
ABSTRACT The problem of “Digital Hoarding” has been studied in a workplace context but
less so in relation to personal use digital data. In this study, we examine the relationship …
less so in relation to personal use digital data. In this study, we examine the relationship …
[HTML][HTML] Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory
Context Protection motivation theory (PMT) is the most frequently used theory in
understanding cyber security behaviors. However, most studies have used a cross-sectional …
understanding cyber security behaviors. However, most studies have used a cross-sectional …
Design and evaluation of TPB based anti-bullying intervention for university students
The presence of Cyberbullying (CB) phenomenon in university students reported in
literature highlights the need for an educational intervention. In this study, we use theory of …
literature highlights the need for an educational intervention. In this study, we use theory of …
Cyber harassment: hate speech with news spread hoax death via the tiktok account@ p********* a
S Narti, Y Yanto - The International Journal of Politics and …, 2023 - ijobsor.pelnus.ac.id
Social media TikTok is a means of communication for today's society. The content presented
on TikTok varies, from positive to negative, so it reaps a lot of comments from netizens …
on TikTok varies, from positive to negative, so it reaps a lot of comments from netizens …
Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach
Purpose This research aims to understand the smartphone security behavior using
protection motivation theory (PMT) and tests the current PMT model employing statistical …
protection motivation theory (PMT) and tests the current PMT model employing statistical …