Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A systematic review of multi perspectives on human cybersecurity behavior
Although the cornerstones of cybersecurity are technical and data-driven solutions, the
human element cannot be disregarded. Understanding users' behavior is essential to spot …
human element cannot be disregarded. Understanding users' behavior is essential to spot …
The cybersecurity behavioral research: A tertiary study
Context Cybersecurity has seen a rise in behavioral investigation during the past decades.
This includes studies being carried out at the primary as well as secondary levels. There are …
This includes studies being carried out at the primary as well as secondary levels. There are …
Exploring the factors that influence the cybersecurity behaviors of young adults
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats.
Understanding the cybersecurity behaviors of young adults, and identifying the measures …
Understanding the cybersecurity behaviors of young adults, and identifying the measures …
Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective
With the increasing importance of cybersecurity in organizations, it becomes crucial that
employees behave securely. In the present article, we investigate the interplay of …
employees behave securely. In the present article, we investigate the interplay of …
I shall, we shall, and all others will: paradoxical information security behaviour
Purpose The purpose of this paper is to investigate the lemming effect as a possible cause
for the privacy paradox in information security. Design/methodology/approach Behavioural …
for the privacy paradox in information security. Design/methodology/approach Behavioural …
Trends in cybersecurity management issues related to human behaviour and machine learning
J Scott, M Kyobe - 2021 international conference on electrical …, 2021 - ieeexplore.ieee.org
The number of organisational cybersecurity threats continues to increase every year as
technology advances. All too often, organisations assume that implementing systems …
technology advances. All too often, organisations assume that implementing systems …
Bring your own device information security policy compliance framework: a systematic literature review and bibliometric analysis (2017–2022)
OAAS AL-Azazi, AA Norman… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
The latest trend of using personal devices for work productivity is Bring Your Own Device
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …
(BYOD). This rapid growth trend has excellent benefits for employees and organizations, but …
An exploration of dark and light triad personality traits towards situational crime prevention and compliant information security behaviour
K Padayachee - Information & Computer Security, 2024 - emerald.com
Purpose This investigation serves a dual purpose: providing preliminary results and serving
as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study …
as a pilot study to confirm the viability of the hypotheses advanced towards a full-scale study …
Understanding the effects of situational crime prevention and personality factors on insider compliance
K Padayachee - Journal of Information Security and Applications, 2022 - Elsevier
This study investigated the moderating effects of situational factors and personality factors
on an insider's attitude towards insider compliance within the domain of information security …
on an insider's attitude towards insider compliance within the domain of information security …