Social engineering attacks: A survey
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …
between humans more accessible and instant. However, personal and sensitive information …
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats
Insider threats are a pernicious threat to modern organizations that involve individuals
intentionally or unintentionally engaging in behaviors that undermine or abuse information …
intentionally or unintentionally engaging in behaviors that undermine or abuse information …
[HTML][HTML] Using protection motivation theory in the design of nudges to improve online security behavior
We conducted an online experiment (n= 2024) on a representative sample of internet users
in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on …
in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on …
Addressing human factors in cybersecurity leadership
WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …
cybersecurity leadership within organizations and discusses strategic communication …
Detecting insider threat via a cyber-security culture framework
A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …
as one of the gravest security hazards for private companies, institutions, and governmental …
[HTML][HTML] Human factors in electronic health records cybersecurity breach: an exploratory analysis
LH Yeo, J Banfield - Perspectives in health information …, 2022 - ncbi.nlm.nih.gov
The healthcare sector continues to be the industry suffering one of the highest costs of a
data security breach. Healthcare lags behind other industries in cybersecurity preparedness …
data security breach. Healthcare lags behind other industries in cybersecurity preparedness …
Employees' behavioural intention to smartphone security: A gender-based, cross-national study
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
A conceptual model for cybersecurity governance
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …
Cybersecurity Capabilities in Develo** Nations and Its Impact on Global Security: A Survey of Social Engineering Attacks and Steps for Mitigation of These Attacks
Cybersecurity refers to the organizational practices followed by the different multinational
companies to defend their computers, servers, mobile devices, and networks from malicious …
companies to defend their computers, servers, mobile devices, and networks from malicious …
Planning for Cyber Security in Schools: The Human Factor.
MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …
century. Computer security is an essential instrument for protecting children, but K-12 …