A systematic review of multi perspectives on human cybersecurity behavior

RA Alsharida, BAS Al-rimy, M Al-Emran, A Zainal - Technology in society, 2023 - Elsevier
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …

Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Cybersecurity awareness enhancement: a study of the effects of age and gender of Thai employees associated with phishing attacks

T Daengsi, P Pornpongtechavanich… - Education and …, 2022 - Springer
Cybersecurity is crucial at present because cyber threats (eg, phishing) have become a very
common occurrence in everyday life. A literature review showed that there are no studies …

Exploring age and gender differences in ICT cybersecurity behaviour

D Branley-Bell, L Coventry, M Dixon… - Human Behavior …, 2022 - Wiley Online Library
Known age differences exist in relation to information and communication technology (ICT)
use, attitudes, access, and literacy. Less is known about age differences in relation to …

The role of cybersecurity knowledge and awareness in cybersecurity intention and behavior in the United States

CS Lee, YT Chua - Crime & Delinquency, 2024 - journals.sagepub.com
Despite the rapid escalation of cybercrimes in modern society, few viable cybersecurity and
cybercrime prevention programs exist. Consequently, this research considers cybersecurity …

Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers

Z Yan, Y Xue, Y Lou - Computers in Human Behavior, 2021 - Elsevier
K-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying
both risk factors and protective factors associated with intuitive and rational judgment of …

Cyber hygiene knowledge, awareness, and behavioral practices of university students

S Baraković, J Baraković Husić - Information Security Journal: A …, 2023 - Taylor & Francis
Personal data is valuable and vulnerable to individuals who have wrong intentions as any
other possessions. This can be mitigated by good cyber hygiene habits. The main aim of this …

The influence of Cybercrime and legal awareness on the behavior of university of Jordan students

I Alhadidi, A Nweiran, G Hilal - Heliyon, 2024 - cell.com
In contemporary times, there has been a rapid increase in the utilization of the Internet and
information technology by students. As a result, educational instructors worldwide have …

Information systems security threats and vulnerabilities: A case of the Institute of Accountancy Arusha (IAA)

AA Semlambo, DM Mfoi… - Journal of Computer …, 2022 - publications.article4sub.com
All modern computer users need to be concerned about information system security
(individuals and organisations). Many businesses established various security structures to …

Until you have something to lose! Loss aversion and two-factor authentication adoption

AR Pratama, FM Firmansyah - Applied Computing and Informatics, 2021 - emerald.com
Purpose In this study, the authors seek to understand factors that naturally influence users to
adopt two-factor authentication (2FA) without even trying to intervene by investigating factors …