Exploring the frontiers of cybersecurity behavior: a systematic review of studies and theories

A Almansoori, M Al-Emran, K Shaalan - Applied Sciences, 2023 - mdpi.com
Cybersecurity procedures and policies are prevalent countermeasures for protecting
organizations from cybercrimes and security incidents. Without considering human …

Cybersecurity Education and Awareness among Parents and Teachers: A Survey of Bahrain

M Ayyash, T Alsboui, O Alshaikh, I Inuwa-Dute… - IEEE …, 2024 - ieeexplore.ieee.org
In today's interconnected and digital world, the need to safeguard sensitive and personal
information is vital. The rise in cybercrime, especially that involving minors and vulnerable …

Revam** advocacy for the digital age: Approaches for nurturing survivor-centered digital resiliency

HL Storer, LB Gezinski, T Shulruff, A Malorni… - Journal of Family …, 2024 - Springer
Purpose Despite the myriad benefits associated with accessing digital technologies, there
has been considerable concern regarding the prevalence of digital dating abuse (DDA) in …

An exploratory data analysis of malware/ransomware cyberattacks: insights from an extensive cyber loss dataset

F Javadnejad, AM Abdelmagid, CA Pinto… - Enterprise Information …, 2024 - Taylor & Francis
This study comprehensively assesses ransomware/malware risks using the Advisen cyber
loss dataset. It classifies malware types by frequency and financial impact, revealing that low …

Cyber Attacker Profiling and Cyberbullying Overview

W Shafik - Cyber Space and Outer Space Security, 2024 - taylorfrancis.com
Because cyberbullying is more common as different devices connect to the Internet, people
are becoming more interested in finding cyber attackers and planning to stop and lessen …

Exploring the cybersecurity-resilience gap: An analysis of student attitudes and behaviors in Higher Education

S Goliath, P Tsibolane, D Snyman - arxiv preprint arxiv:2411.03219, 2024 - arxiv.org
Cyberattacks frequently target higher educational institutions, making cybersecurity
awareness and resilience critical for students. However, limited research exists on …

[HTML][HTML] An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks

F Alotaibi, RK Karne, AL Wijesinha… - … of Cybersecurity and …, 2024 - mdpi.com
The Internet has become the primary vehicle for doing almost everything online, and
smartphones are needed for almost everyone to live their daily lives. As a result …

[HTML][HTML] Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences

Y Al-Saggaf, J Maclean - Information, 2024 - mdpi.com
While existing studies explore smartphone privacy setting risks for adolescents, they provide
limited insight into the role of gender in these dynamics. This study aims to enhance …

Security and Threat in Online Social Networking

SK Kapoor, K Sankhla, P Agarwal… - Online Social Networks …, 2024 - Wiley Online Library
Online social networking security is the topic of this abstract. Users deal with identity theft,
cyberbullying, and privacy violations. In order to combat false information, bogus accounts …

Protecting Children's Data from Cybersecurity Attacks to Prevent Child Sexual Abuse: A Techno-Legal Approach

S Gupta, S Kumari, U Sugandh - … International Conference on …, 2023 - ieeexplore.ieee.org
The increasing technological advancements and interconnectedness in today's world have
created a parallel digital realm for children to connect, learn, and communicate. However …