[HTML][HTML] A systematic analysis of failures in protecting personal health data: a sco** review

J Pool, S Akhlaghpour, F Fatehi… - International Journal of …, 2024 - Elsevier
Personal health data breaches pose significant challenges to healthcare providers and
clients. This study systematically analyzes 5470 records and reviews 120 articles on this …

[HTML][HTML] A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprises

S Chaudhary, V Gkioulos, S Katsikas - Computer Science Review, 2023 - Elsevier
The proliferation of information and communication technologies in enterprises enables
them to develop new business models and enhance their operational and commercial …

Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents

C Donalds, KM Osei-Bryson - International Journal of Information …, 2020 - Elsevier
Recent information and cybersecurity research have focused on improving individuals'
security compliance behavior. However, improved security performance remains a …

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

B AlGhanboosi, S Ali, A Tarhini - Computers in Human Behavior, 2023 - Elsevier
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …

[HTML][HTML] Frontline healthcare providers' behavioural intention to Internet of Things (IoT)-enabled healthcare applications: A gender-based, cross-generational study

M Alraja - Technological Forecasting and Social Change, 2022 - Elsevier
There are numerous risks associated with the interconnection of healthcare provision and
the Internet of Things (IoT), with its sensory capabilities shown to reduce confidence in novel …

Employees' behavioural intention to smartphone security: A gender-based, cross-national study

N Ameen, A Tarhini, MH Shah, NO Madichie - Computers in Human …, 2020 - Elsevier
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …

The role of employees' information security awareness on the intention to resist social engineering

T Grassegger, D Nedbal - Procedia Computer Science, 2021 - Elsevier
Social engineering is a form of attack trying to manipulate employees to make them disclose
confidential information or perform actions that threatens the security of organizations. The …

Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis

A Ioannou, I Tussyadiah, G Miller, S Li, M Weick - PloS one, 2021 - journals.plos.org
Objective Digital nudging has been mooted as a tool to alter user privacy behavior.
However, empirical studies on digital nudging have yielded divergent results: while some …

Would you go invisible on social media? An empirical study on the antecedents of users' lurking behavior

Y Hong, J Hu, Y Zhao - Technological Forecasting and Social Change, 2023 - Elsevier
With the ubiquity of social networks, users of social network apps are likelier to lurk rather
than interact. Accordingly, users' lurking behavior in online communities deserves more …

How to attack and generate honeywords

D Wang, Y Zou, Q Dong, Y Song… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Honeywords are decoy passwords associated with each user account to timely detect
password leakage. The key issue lies in how to generate honeywords that are hard to be …