Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Navigating cybersecurity training: A comprehensive review
In the dynamic realm of cybersecurity, awareness training is crucial for strengthening
defenses against cyber threats. This survey examines a spectrum of cybersecurity …
defenses against cyber threats. This survey examines a spectrum of cybersecurity …
[HTML][HTML] Assessing the effect of cybersecurity training on End-users: A Meta-analysis
Cybersecurity behaviour of end-users continues to be a growing topic of conversation, both
in organisations and in academia, as end-users are often said to be the last line of defence …
in organisations and in academia, as end-users are often said to be the last line of defence …
A review of organization-oriented phishing research
The increased sophistication and frequency of phishing attacks that target organizations
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …
necessitate a comprehensive cyber security strategy to handle phishing attacks from several …
Information security analysis of online education management system using information technology infrastructure library version 3
MC Pontoan, JI SIhotang… - MATRIK: Jurnal …, 2023 - journal.universitasbumigora.ac.id
The rapid development of information affects many aspects of human life. So that the field of
information security becomes one aspect that must be considered. This study aims to …
information security becomes one aspect that must be considered. This study aims to …
[HTML][HTML] Information Security Awareness in the Insurance Sector: Cognitive and Internal Factors and Combined Recommendations
Cybercrime is currently rapidly develo**, requiring an increased demand for information
security knowledge. Attackers are becoming more sophisticated and complex in their assault …
security knowledge. Attackers are becoming more sophisticated and complex in their assault …
[PDF][PDF] Exploring the effectiveness of cybersecurity training programs: factors, best practices, and future directions
S Nasir - Proceedings of the Cyber Secure Nigeria Conference, 2023 - researchgate.net
Cybersecurity education is essential in equip** individuals with the proper knowledge and
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …
skill sets to protect devices, computers, networks and data from cybersecurity risk. This …
TOPSIS-based framework for evaluating employee cybersecurity risk
K Kostelić - Croatian Operational Research Review, 2025 - hrcak.srce.hr
Sažetak This paper presents the development and initial validation of a TOPSIS-based
framework for evaluating employee cybersecurity risk (TFEECR). The framework offers a …
framework for evaluating employee cybersecurity risk (TFEECR). The framework offers a …
Information Security Awareness Literature Review: Focus Area for Measurement Instruments
MA Rizal, B Setiawan - Procedia Computer Science, 2024 - Elsevier
A critical factor in information security is information security awareness, that each individual
owns. Information security awareness can be increased by measuring individual security …
owns. Information security awareness can be increased by measuring individual security …
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
AM Asfahani - International Journal of Information Security, 2024 - Springer
The study aims to explore the crucial interaction between organizational responsibility and
employee behavior in cybersecurity, particularly in the distinct setting of Saudi Arabia. It …
employee behavior in cybersecurity, particularly in the distinct setting of Saudi Arabia. It …
[PDF][PDF] Enhancing regulatory compliance through training and development programs: Case studies and recommendations
M Tilala, AD Chawda, AP Benke - J. Cardiovasc. Res, 2023 - researchgate.net
This article explores the significance of training and development in improving worker
performance, particularly in the realm of Information Systems (IS) security. Recognizing that …
performance, particularly in the realm of Information Systems (IS) security. Recognizing that …