A systematic review of multi perspectives on human cybersecurity behavior
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …
human element cannot be disregarded. Understanding users' behavior is essential to spot …
Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
The cybersecurity behavioral research: A tertiary study
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …
This includes studies being carried out at the primary as well as secondary levels. There are …
Exploration of the impact of cybersecurity awareness on small and medium enterprises (SMEs) in Wales using intelligent software to combat cybercrime
Intelligent software packages have become fast-growing in popularity for large businesses
in both developed and developing countries, due to their higher availability in detecting and …
in both developed and developing countries, due to their higher availability in detecting and …
[HTML][HTML] Analysis of cybersecurity competencies: Recommendations for telecommunications policy
EK Szczepaniuk, H Szczepaniuk - Telecommunications Policy, 2022 - Elsevier
The paper aims to analyse and assess cybersecurity competencies and define the
recommended solutions to improve the human factor in cybersecurity. The article presents …
recommended solutions to improve the human factor in cybersecurity. The article presents …
Group key management in internet of things: A systematic literature review
IoT networks are gaining popularity in terms of group networks built by sensor nodes and
other IoT-related devices. The significance of cryptography protocols for secure …
other IoT-related devices. The significance of cryptography protocols for secure …
Impact of COVID-19 pandemic circumstances on cyber hygiene of university students
S Baraković, J Baraković Husić - International Journal of Human …, 2024 - Taylor & Francis
The covid-19 pandemic has motivated the cyber security research activities mainly at
national and organizational level, but broader assessment of cyber security at individual …
national and organizational level, but broader assessment of cyber security at individual …
A study on the impact of gender, employment status, and academic discipline on cyber-hygiene: A case study of University of Nigeria, Nsukka
The COVID-19 pandemic has helped amplify the importance of Cyber-hygiene. As the
reliance on the Internet and IT services increased during the pandemic, this in turn has …
reliance on the Internet and IT services increased during the pandemic, this in turn has …
A Quadruple “E” Approach for Effective Cyber-Hygiene Behaviour and Attitude toward Online Learning among Higher-Education Students in Saudi Arabia amid …
MA Salem, AEE Sobaih - Electronics, 2023 - mdpi.com
The spread of SARS-CoV-2 (COVID-19) has made online learning more common worldwide
than ever before. However, recent research showed that higher-education students in the …
than ever before. However, recent research showed that higher-education students in the …
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
O Flor-Unda, F Simbaña, X Larriva-Novo, Á Acuña… - Informatics, 2023 - mdpi.com
Vulnerabilities in cyber defense in the countries of the Latin American region have favored
the activities of cybercriminals from different parts of the world who have carried out a …
the activities of cybercriminals from different parts of the world who have carried out a …