Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
Human factors in cybersecurity: Risks and impacts
Technological solutions in the mobile and digital era are becoming more helpful in informing
the population, educational systems, monitoring, tracking the individuals, working, and …
the population, educational systems, monitoring, tracking the individuals, working, and …
WITHDRAWN: Determining the impact of cyber security awareness on employee behaviour: A case of Saudi Arabia
MI Alghamdi - 2021 - Elsevier
Withdrawal Notice WITHDRAWN: Determining the impact of cyber security awareness on
employee behaviour: A case of Saudi ArabiaMohammed I. Alghamdi Department of …
employee behaviour: A case of Saudi ArabiaMohammed I. Alghamdi Department of …
Issues and trends in information security policy compliance
SH Bhaharin, U Asma'Mokhtar… - … on Research and …, 2019 - ieeexplore.ieee.org
In the era of Industry 4.0 (IR 4.0), information leakage has become a critical issue for
information security. The basic approach to addressing information leakage threats is to …
information security. The basic approach to addressing information leakage threats is to …
Assessing information security behaviour: A self-determination theory perspective
Y Gangire, A Da Veiga, M Herselman - Information & Computer …, 2021 - emerald.com
Purpose This paper outlines the development of a validated questionnaire for assessing
information security behaviour. The purpose of this paper is to present data from the …
information security behaviour. The purpose of this paper is to present data from the …
Do SETA Interventions Change Security Behavior?: A Literature Review
U Nwachukwu, J Vidgren, M Niemimaa… - Proceedings of the …, 2023 - jyx.jyu.fi
Information security education, training, and awareness (SETA) are approaches to changing
end-users' security behavior. Research into SETA has conducted interventions to study the …
end-users' security behavior. Research into SETA has conducted interventions to study the …
A conceptual model of information security compliant behaviour based on the self-determination theory
Y Gangire, A Da Veiga… - 2019 Conference on …, 2019 - ieeexplore.ieee.org
The increase in threats to information systems resources in organisations has been
attributed to the failure by employees to adhere to information security policies. Research …
attributed to the failure by employees to adhere to information security policies. Research …
Implementation of machine learning for human aspect in information security awareness
VS Saridewi, RF Sari - Journal of Applied Engineering Science, 2021 - aseestant.ceon.rs
This research discussed our experienced on building a machine learning model on the
human aspect of information security awareness. The model was built through a …
human aspect of information security awareness. The model was built through a …
Information security behavior: Development of a measurement instrument based on the self-determination theory
Y Gangire, A Da Veiga, M Herselman - International Symposium on …, 2020 - Springer
Employee information security behaviour is important in securing an organisation's
information technology resources. Employees can act in a risky or secure manner. Improving …
information technology resources. Employees can act in a risky or secure manner. Improving …
The impact of employees' information security awareness on information security behaviour
MI Fianty - IJISTECH (International Journal of Information System …, 2023 - ijistech.org
Internal threats have been a hot topic in information security for several years. According to a
2018 Insider Threat Reports survey, 51% of users are more concerned about internal …
2018 Insider Threat Reports survey, 51% of users are more concerned about internal …