Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Amidst growing IT security challenges, psychological underpinnings of security behaviors
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one's …
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one's …
[HTML][HTML] Gamification in workforce training: Improving employees' self-efficacy and information security and data protection behaviours
This research aims to address two questions:(1) how can gamification strategies increase
success of e-training systems and enhance employees' information security and data …
success of e-training systems and enhance employees' information security and data …
[HTML][HTML] Towards a cybersecurity culture-behaviour framework: A rapid evidence review
A strong organisational cybersecurity culture (CSC) is critical to the success of any
cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed …
cybersecurity effort, and understanding and measuring CSC is essential if it is to succeed …
An interdisciplinary approach to enhancing cyber threat prediction utilizing forensic cyberpsychology and digital forensics
MS Rich, MP Aiken - Forensic Sciences, 2024 - mdpi.com
The Cyber Forensics Behavioral Analysis (CFBA) model merges Cyber Behavioral Sciences
and Digital Forensics to improve the prediction and effectiveness of cyber threats from …
and Digital Forensics to improve the prediction and effectiveness of cyber threats from …
A taxonomy of factors that contribute to organizational Cybersecurity Awareness (CSA)
Purpose Develo** cybersecurity awareness (CSA) is becoming a more and more
important goal for modern organizations. CSA is a complex sociotechnical system where …
important goal for modern organizations. CSA is a complex sociotechnical system where …
Information Security Awareness in Higher Education Institutes: A Work in Progress
The demands for information security in Higher Education Institutions (HEIs) are expanding
as HEIs are vulnerable because of the involvement of human factors. Hence, maintaining …
as HEIs are vulnerable because of the involvement of human factors. Hence, maintaining …
[HTML][HTML] Enhancing Microsoft 365 Security: Integrating Digital Forensics Analysis to Detect and Mitigate Adversarial Behavior Patterns
MS Rich - Forensic Sciences, 2023 - mdpi.com
This research article investigates the effectiveness of digital forensics analysis (DFA)
techniques in identifying patterns and trends in malicious failed login attempts linked to …
techniques in identifying patterns and trends in malicious failed login attempts linked to …
Develo** a scale for measuring the information security awareness of stakeholders in higher education institutions
The field of information security is experiencing growing popularity within Higher Education
Institutions (HEIs), reflecting the increasing recognition of its importance in safeguarding …
Institutions (HEIs), reflecting the increasing recognition of its importance in safeguarding …
'Ought'should not assume 'Can'? Basic Capabilities in Cybersecurity to Ground Sen's Capability Approach
We inhabit a 'digital first'society, which is only viable if everyone, regardless of ability and
capacity, is able to benefit from online offerings in a safe and secure way. However, disabled …
capacity, is able to benefit from online offerings in a safe and secure way. However, disabled …
A Survey on Human Factors in Cyberspace: A New Dimension of Privacy Threats
Cyberspace is a collection of computer systems, networks, telecommunication networks, and
embedded systems connected to communicate large volumes of digital data and …
embedded systems connected to communicate large volumes of digital data and …