The role of user behaviour in improving cyber security management
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …
engineering, and information communications technology. The term 'information security'has …
Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
The advent of new technologies and the rapid growth of internet users have given birth to
the menace of cyber-crime. Unfortunately, it is increasing at an alarming pace. This situation …
the menace of cyber-crime. Unfortunately, it is increasing at an alarming pace. This situation …
Correlating human traits and cyber security behavior intentions
In this paper, we correlate human characteristics with cyber security behavior intentions.
While previous papers have identified correlations between certain human traits and specific …
While previous papers have identified correlations between certain human traits and specific …
An exploratory study of cyber hygiene behaviors and knowledge
AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …
need a deeper understanding of the user differences that are associated with either good or …
Privacy and security threat models and mitigation strategies of older adults
Older adults (65+) are becoming primary users of emerging smart systems, especially in
health care. However, these technologies are often not designed for older users and can …
health care. However, these technologies are often not designed for older users and can …
What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime …
Individual internet users are commonly considered the weakest links in the cybersecurity
chain. One reason for this is that they tend to be overoptimistic regarding their own online …
chain. One reason for this is that they tend to be overoptimistic regarding their own online …
Exploring the factors that influence the cybersecurity behaviors of young adults
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats.
Understanding the cybersecurity behaviors of young adults, and identifying the measures …
Understanding the cybersecurity behaviors of young adults, and identifying the measures …
Exploring age and gender differences in ICT cybersecurity behaviour
Known age differences exist in relation to information and communication technology (ICT)
use, attitudes, access, and literacy. Less is known about age differences in relation to …
use, attitudes, access, and literacy. Less is known about age differences in relation to …
How do Older Adults feel about engaging with Cyber‐Security?
Older adults are increasingly a target for cyber‐attacks; however, very little research has
investigated how they feel about engaging in protective cyber‐security behaviors. We …
investigated how they feel about engaging in protective cyber‐security behaviors. We …
Holistic cyber hygiene education: Accounting for the human factors
Cybersecurity is paramount in modern cyberdefense. One important factor linked to reducing
human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the …
human-instigated breaches of cybersecurity includes cyber hygiene. Cyber hygiene is the …