Exclude:

OPAC

E-Resources

Federated Resources

Premium Resources

Showing all Resources, Excluding Opac and Electronic and Premium resources

Impact of digital nudging on information security behavior: an experimental study on framing and priming in cybersecurity

Author:Kavya Sharma, Xinhui Zhan, Fiona Fui-Hoon Nah, Keng Siau and Maggie X. Cheng
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose Phishing attacks are the most common cyber threats targeted at users. Digital nudging in …

Modelling the ethical priorities influencing decision-making in cybersecurity contexts

Author:Bakhtiar Sadeghi, Deborah Richards, Paul Formosa, Mitchell McEwan, Muhammad Hassan Ali Bajwa, Michael Hitchens and Malcolm Ryan
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose Cybersecurity vulnerabilities are often due to human users acting according to their own…

Determining cybersecurity culture maturity and deriving verifiable improvement measures

Author:Peter Dornheim and Ruediger Zarnekow
Publisher:Information & Computer Security,
Abstract: Purpose The human factor is the most important defense asset against cyberattacks. To ensure that…

Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review

Author:Natile Nonhlanhla Cele and Sheila Kwenda
Publisher:Journal of Financial Crime,
Abstract: Purpose The purpose of the study is to identify cybersecurity threats that hinder the adoption of…

Cybersecurity in modern cars: awareness and readiness of auto workshops

Author:David Hedberg, Martin Lundgren and Marcus Nohlberg
Publisher:Information & Computer Security,
Abstract: Purpose This study aims to explore auto mechanics awareness of repairs and maintenance related to…

Cultivating self-efficacy to empower professionals’ re-up skilling in cybersecurity

Author:Eliana Stavrou and Andriani Piki
Publisher:Information & Computer Security,
Abstract: Purpose The accelerated digital transformation and the growing emphasis on privacy, safety and se…

Cybersecurity behaviours of the employees and students at the Estonian Academy of Security Sciences

Author:Kate-Riin Kont
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose The purpose of this study is to identify the most common characteristics that make Intern…

An intuitive approach to cybersecurity risk assessment for non-governmental organizations

Author:Kawther Saeedi, Mariyam Abduljabbar Hassan, Suaad Alarifi and Haya Almagwashi
Publisher:Transforming Government: People, Process and Policy,
Abstract: Purpose This study proposes a guided tool for cybersecurity risk assessment tailored for nongover…

Got milk? Got cybersecurity risks! Unraveling ransomware threats in the German dairy industry

Author:Eduard Anton, Helena Aptyka and Frank Teuteberg
Publisher:Organizational Cybersecurity Journal: Practice, Process and People,
Abstract: Purpose This study aims to explore the vulnerabilities of the dairy industry to ransomware threat…

House price momentum and strategic complementarity

Author:Adam M. Guren
Publisher:University of Chicago Press
Abstract: House prices exhibit substantially more momentum, positive autocorrelation in price changes, than e…
Powered by: