Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …
organizations from cybercrimes and security incidents. Without considering human …
Cybersecurity Education and Awareness among Parents and Teachers: A Survey of Bahrain
In today's interconnected and digital world, the need to safeguard sensitive and personal
information is vital. The rise in cybercrime, especially that involving minors and vulnerable …
information is vital. The rise in cybercrime, especially that involving minors and vulnerable …
Revam** advocacy for the digital age: Approaches for nurturing survivor-centered digital resiliency
Purpose Despite the myriad benefits associated with accessing digital technologies, there
has been considerable concern regarding the prevalence of digital dating abuse (DDA) in …
has been considerable concern regarding the prevalence of digital dating abuse (DDA) in …
An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset
This study comprehensively assesses ransomware/malware risks using the Advisen cyber
loss dataset. It classifies malware types by frequency and financial impact, revealing that low …
loss dataset. It classifies malware types by frequency and financial impact, revealing that low …
Cyber Attacker Profiling and Cyberbullying Overview
W Shafik - Cyber Space and Outer Space Security, 2024 - taylorfrancis.com
Because cyberbullying is more common as different devices connect to the Internet, people
are becoming more interested in finding cyber attackers and planning to stop and lessen …
are becoming more interested in finding cyber attackers and planning to stop and lessen …
Exploring the cybersecurity-resilience gap: An analysis of student attitudes and behaviors in Higher Education
S Goliath, P Tsibolane, D Snyman - arxiv preprint arxiv:2411.03219, 2024 - arxiv.org
Cyberattacks frequently target higher educational institutions, making cybersecurity
awareness and resilience critical for students. However, limited research exists on …
awareness and resilience critical for students. However, limited research exists on …
[HTML][HTML] An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks
F Alotaibi, RK Karne, AL Wijesinha… - … of Cybersecurity and …, 2024 - mdpi.com
The Internet has become the primary vehicle for doing almost everything online, and
smartphones are needed for almost everyone to live their daily lives. As a result …
smartphones are needed for almost everyone to live their daily lives. As a result …
[HTML][HTML] Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences
Y Al-Saggaf, J Maclean - Information, 2024 - mdpi.com
While existing studies explore smartphone privacy setting risks for adolescents, they provide
limited insight into the role of gender in these dynamics. This study aims to enhance …
limited insight into the role of gender in these dynamics. This study aims to enhance …
Security and Threat in Online Social Networking
Online social networking security is the topic of this abstract. Users deal with identity theft,
cyberbullying, and privacy violations. In order to combat false information, bogus accounts …
cyberbullying, and privacy violations. In order to combat false information, bogus accounts …
Protecting Children's Data from Cybersecurity Attacks to Prevent Child Sexual Abuse: A Techno-Legal Approach
The increasing technological advancements and interconnectedness in today's world have
created a parallel digital realm for children to connect, learn, and communicate. However …
created a parallel digital realm for children to connect, learn, and communicate. However …