[HTML][HTML] A systematic analysis of failures in protecting personal health data: a sco** review
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …
[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …
them to develop new business models and enhance their operational and commercial …
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents
Recent information and cybersecurity research have focused on improving individuals'
security compliance behavior. However, improved security performance remains a …
security compliance behavior. However, improved security performance remains a …
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …
other hand, criminals find social media applications a rich place to attack through techniques …
[HTML][HTML] Frontline healthcare providers' behavioural intention to Internet of Things (IoT)-enabled healthcare applications: A gender-based, cross-generational study
M Alraja - Technological Forecasting and Social Change, 2022 - Elsevier
There are numerous risks associated with the interconnection of healthcare provision and
the Internet of Things (IoT), with its sensory capabilities shown to reduce confidence in novel …
the Internet of Things (IoT), with its sensory capabilities shown to reduce confidence in novel …
Employees' behavioural intention to smartphone security: A gender-based, cross-national study
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …
The role of employees' information security awareness on the intention to resist social engineering
T Grassegger, D Nedbal - Procedia Computer Science, 2021 - Elsevier
Social engineering is a form of attack trying to manipulate employees to make them disclose
confidential information or perform actions that threatens the security of organizations. The …
confidential information or perform actions that threatens the security of organizations. The …
Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis
Objective Digital nudging has been mooted as a tool to alter user privacy behavior.
However, empirical studies on digital nudging have yielded divergent results: while some …
However, empirical studies on digital nudging have yielded divergent results: while some …
Would you go invisible on social media? An empirical study on the antecedents of users' lurking behavior
Y Hong, J Hu, Y Zhao - Technological Forecasting and Social Change, 2023 - Elsevier
With the ubiquity of social networks, users of social network apps are likelier to lurk rather
than interact. Accordingly, users' lurking behavior in online communities deserves more …
than interact. Accordingly, users' lurking behavior in online communities deserves more …
How to attack and generate honeywords
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …
password leakage. The key issue lies in how to generate honeywords that are hard to be …