A systematic review of approaches to assessing cybersecurity awareness
NHA Rahim, S Hamid, ML Mat Kiah, S Shamshirband… - Kybernetes, 2015 - emerald.com
Purpose–The purpose of this paper is to survey, explore and inform researchers about the
previous methodologies applied, target audience and coverage of previous assessment of …
previous methodologies applied, target audience and coverage of previous assessment of …
Compliance with Bring Your Own Device security policies in organizations: A systematic literature review
Abstract The omnipresence of Bring Your Own Device (BYOD) in organizations and
employees' lives makes it a challenge to ensure adherence to security policy. In such …
employees' lives makes it a challenge to ensure adherence to security policy. In such …
Improving risk assessment model of cyber security using fuzzy logic inference system
This paper describes the impacts of criminal activities based on the nature of the crime, the
victim, and the basis (whether short-term or long-range/term) of the impacts of cybercrime on …
victim, and the basis (whether short-term or long-range/term) of the impacts of cybercrime on …
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
J Imgraben, A Engelbrecht… - Behaviour & Information …, 2014 - Taylor & Francis
Smart mobile devices are a potential attack vector for cyber criminal activities. Two hundred
and fifty smart mobile device owners from the University of South Australia were surveyed …
and fifty smart mobile device owners from the University of South Australia were surveyed …
BYOD policy compliance: Risks and strategies in organizations
R Palanisamy, AA Norman… - Journal of Computer …, 2022 - Taylor & Francis
The proliferation of mobile devices has brought the Bring Your Own Device (BYOD) trend in
organizations, along with significant challenges when employees fail to comply with security …
organizations, along with significant challenges when employees fail to comply with security …
SETA and security behavior: Mediating role of employee relations, monitoring, and accountability
W Yaokumah, DO Walker, P Kumah - Journal of Global Information …, 2019 - igi-global.com
This article contends that information security education, training and awareness programs
can improve employee security behavior. Empirical studies have analyzed the direct effects …
can improve employee security behavior. Empirical studies have analyzed the direct effects …
BYOD security risks and mitigation strategies: Insights from IT security experts
R Palanisamy, AA Norman… - Journal of Organizational …, 2021 - Taylor & Francis
ABSTRACT Bring Your Own Device (BYOD) is considered one of the top security risks
organizations face today as these devices are very much part of the working culture of …
organizations face today as these devices are very much part of the working culture of …
An exploratory study on sustaining cyber security protection through Seta Implementation
G Wang, D Tse, Y Cui, H Jiang - Sustainability, 2022 - mdpi.com
It is undeniable that most business organizations rely on the Internet to conduct their highly
competitive businesses nowadays. Cyber security is one of the important elements for …
competitive businesses nowadays. Cyber security is one of the important elements for …
A review of methods for evaluating security awareness initiatives
G Assenza, A Chittaro, MC De Maggio… - European Journal for …, 2020 - Springer
The 'human factor'is commonly considered to be the weakest link in an organization's
security chain, and a significant percentage of companies have implemented security …
security chain, and a significant percentage of companies have implemented security …
EBSS: A secure blockchain-based sharing scheme for real estate financial credentials
Y Wu, G Tie, Y Yu, J Li, J Song - World Wide Web, 2023 - Springer
With the development of Internet finance, the real estate financial credentials have been
extensively utilized in capital and trading markets. The extensive use of these private …
extensively utilized in capital and trading markets. The extensive use of these private …