Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cyber security training for critical infrastructure protection: A literature review
Introduction: Today, cyber-security curricula are available across educational types and
levels, including a vast array of programs and modules tailored to specific sectors of industry …
levels, including a vast array of programs and modules tailored to specific sectors of industry …
Don't click: towards an effective anti-phishing training. A comparative literature review
Email is of critical importance as a communication channel for both business and personal
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
matters. Unfortunately, it is also often exploited for phishing attacks. To defend against such …
Educating and raising awareness on cyber security social engineering: A literature review
H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …
information technology and ubiquity of devices, has emerged as one of the most challenging …
Organizational science and cybersecurity: abundant opportunities for research at the interface
Cybersecurity is an ever-present problem for organizations, but organizational science has
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …
Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …
The cybersecurity behavioral research: A tertiary study
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …
This includes studies being carried out at the primary as well as secondary levels. There are …
Online safety awareness and human factors: An application of the theory of human ecology
Efforts have been made on large and small scales to reduce cybersecurity threats around
the world, including in Malaysia. However, scholars have argued that, in spite of the …
the world, including in Malaysia. However, scholars have argued that, in spite of the …
Risk modelling of cyber threats against MIS and ERP applications
A Efe - Pamukkale Üniversitesi İşletme Araştırmaları Dergisi, 2024 - dergipark.org.tr
This study presents a detailed examination of cyber threats impacting Management
Information Systems (MIS) and Enterprise Resource Planning (ERP) applications. It explores …
Information Systems (MIS) and Enterprise Resource Planning (ERP) applications. It explores …
[HTML][HTML] The roles of phishing knowledge, cue utilization, and decision styles in phishing email detection
This study investigated the roles of phishing knowledge, cue utilization, and decision styles
in contributing to phishing email detection. Participants (N= 145) completed an online email …
in contributing to phishing email detection. Participants (N= 145) completed an online email …
Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training
Antiphishing training is a critical element of an organization's security posture. Yet, its
effectiveness is often limited by trainees' perception that it is boring and unengaging, which …
effectiveness is often limited by trainees' perception that it is boring and unengaging, which …