A systematic review of multi perspectives on human cybersecurity behavior

RA Alsharida, BAS Al-rimy, M Al-Emran, A Zainal - Technology in Society, 2023 - Elsevier
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …

The cybersecurity behavioral research: A tertiary study

NF Khan, A Yaqoob, MS Khan, N Ikram - Computers & Security, 2022 - Elsevier
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …

Exploring the factors that influence the cybersecurity behaviors of young adults

M Alanazi, M Freeman, H Tootell - Computers in Human Behavior, 2022 - Elsevier
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats.
Understanding the cybersecurity behaviors of young adults, and identifying the measures …

Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective

HL Kim, C Gerdenitsch, D Wurhofer… - … : Journal of Psychosocial …, 2023 - cyberpsychology.eu
With the increasing importance of cybersecurity in organizations, it becomes crucial that
employees behave securely. In the present article, we investigate the interplay of …

I shall, we shall, and all others will: paradoxical information security behaviour

DP Snyman, H Kruger, WD Kearney - Information & Computer …, 2018 - emerald.com
Purpose The purpose of this paper is to investigate the lemming effect as a possible cause
for the privacy paradox in information security. Design/methodology/approach Behavioural …

Trends in cybersecurity management issues related to human behaviour and machine learning

J Scott, M Kyobe - 2021 international conference on electrical …, 2021 - ieeexplore.ieee.org
The number of organisational cybersecurity threats continues to increase every year as
technology advances. All too often, organisations assume that implementing systems …

Bring your own device information security policy compliance framework: a systematic literature review and bibliometric analysis (2017–2022)

OAAS AL-Azazi, AA Norman… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
The latest trend of using personal devices for work productivity is Bring Your Own Device
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …

An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour

K Padayachee - Information & Computer Security, 2024 - emerald.com
Purpose This investigation serves a dual purpose: providing preliminary results and serving
as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study …

Understanding the effects of situational crime prevention and personality factors on insider compliance

K Padayachee - Journal of Information Security and Applications, 2022 - Elsevier
This study investigated the moderating effects of situational factors and personality factors
on an insider's attitude towards insider compliance within the domain of information security …