A systematic review of approaches to assessing cybersecurity awareness

NHA Rahim, S Hamid, ML Mat Kiah, S Shamshirband… - Kybernetes, 2015 - emerald.com
Purpose–The purpose of this paper is to survey, explore and inform researchers about the
previous methodologies applied, target audience and coverage of previous assessment of …

Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …

Improving risk assessment model of cyber security using fuzzy logic inference system

M Alali, A Almogren, MM Hassan, IAL Rassan… - Computers & …, 2018 - Elsevier
This paper describes the impacts of criminal activities based on the nature of the crime, the
victim, and the basis (whether short-term or long-range/term) of the impacts of cybercrime on …

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users

J Imgraben, A Engelbrecht… - Behaviour & Information …, 2014 - Taylor & Francis
Smart mobile devices are a potential attack vector for cyber criminal activities. Two hundred
and fifty smart mobile device owners from the University of South Australia were surveyed …

BYOD policy compliance: Risks and strategies in organizations

R Palanisamy, AA Norman… - Journal of Computer …, 2022 - Taylor & Francis
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in
organizations, along with significant challenges when employees fail to comply with security …

SETA and security behavior: Mediating role of employee relations, monitoring, and accountability

W Yaokumah, DO Walker, P Kumah - Journal of Global Information …, 2019 - igi-global.com
This article contends that information security education, training and awareness programs
can improve employee security behavior. Empirical studies have analyzed the direct effects …

BYOD security risks and mitigation strategies: Insights from IT security experts

R Palanisamy, AA Norman… - Journal of Organizational …, 2021 - Taylor & Francis
ABSTRACT Bring Your Own Device (BYOD) is considered one of the top security risks
organizations face today as these devices are very much part of the working culture of …

An exploratory study on sustaining cyber security protection through Seta Implementation

G Wang, D Tse, Y Cui, H Jiang - Sustainability, 2022 - mdpi.com
It is undeniable that most business organizations rely on the Internet to conduct their highly
competitive businesses nowadays. Cyber security is one of the important elements for …

A review of methods for evaluating security awareness initiatives

G Assenza, A Chittaro, MC De Maggio… - European Journal for …, 2020 - Springer
The 'human factor'is commonly considered to be the weakest link in an organization's
security chain, and a significant percentage of companies have implemented security …

EBSS: A secure blockchain-based sharing scheme for real estate financial credentials

Y Wu, G Tie, Y Yu, J Li, J Song - World Wide Web, 2023 - Springer
With the development of Internet finance, the real estate financial credentials have been
extensively utilized in capital and trading markets. The extensive use of these private …