Academic literature on the topic 'Cybersecurity behaviour'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity behaviour.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity behaviour"

1

Sajikumar, Sariga, N. Ajithkumar, and Gopu Vijayan. "Exploring the Interplay of Privacy Concerns, Mobile Cybersecurity Awareness, and Protective Motivation Behavior." International Journal of Religion 5, no. 5 (2024): 612–19. http://dx.doi.org/10.61707/kqyq0505.

Full text
Abstract:
This study delves into the uncharted realm of privacy concerns among Indian smartphone users, exploring their nexus with mobile cybersecurity awareness and protective behaviour. Employing the Mobile User's Information Privacy Concern (MUIPC) tool and Protection Motivation Theory (PMT), it addresses gaps by scrutinizing users' concerns, data protection motivations, and cybersecurity awareness impact. Focused on the Indian smartphone user base, this research illuminates crucial insights into mobile privacy dynamics, informing privacy policies, user education, and cybersecurity strategies. Survey
APA, Harvard, Vancouver, ISO, and other styles
2

Shah, Pintu, and Anuja Agarwal. "Cybersecurity behaviour of smartphone users in India: an empirical analysis." Information & Computer Security 28, no. 2 (2020): 293–318. http://dx.doi.org/10.1108/ics-04-2019-0041.

Full text
Abstract:
Purpose For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essent
APA, Harvard, Vancouver, ISO, and other styles
3

Branley-Bell, Dawn, Lynne Coventry, Matt Dixon, Adam Joinson, and Pam Briggs. "Exploring Age and Gender Differences in ICT Cybersecurity Behaviour." Human Behavior and Emerging Technologies 2022 (October 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/2693080.

Full text
Abstract:
Known age differences exist in relation to information and communication technology (ICT) use, attitudes, access, and literacy. Less is known about age differences in relation to cybersecurity risks and associated cybersecurity behaviours. Using an online survey, this study analyses data from 579 participants to investigate age differences across four key cybersecurity behaviours: device securement, password generation, proactive checking, and software updating. Significant age differences were found; however, this is not a straightforward relationship. Older users appear less likely to secure
APA, Harvard, Vancouver, ISO, and other styles
4

Austin Oguejiofor Amaechi. "A methodological framework for fostering cybersecurity mindsets and behaviour." International Journal of Science and Research Archive 15, no. 2 (2025): 1799–810. https://doi.org/10.30574/ijsra.2025.15.2.1659.

Full text
Abstract:
The continuously growing attack surfaces and artificial intelligence-enabled attacks have increased the overwhelming nature of the cybersecurity challenge. The result is that to some organizations, no amount of preparedness can guarantee immunity from cyber-attacks. Cybersecurity preparedness is an ongoing process and incentivizing the right behaviour is an essential characteristic of a human-centered whole-of-enterprise approach to cybersecurity. While there are many techniques developed to improve and understand cybersecurity decision making, there is a lack of design methodologies to allow
APA, Harvard, Vancouver, ISO, and other styles
5

B.S.Mounika Yadav, Komali Guthikonda, and Venu Matta. "Cybersecurity Threat Analysis and Behaviour Analysis: A Comprehensive Approach to Proactive Défense." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 67–70. https://doi.org/10.46647/ijetms.2025.v09si01.010.

Full text
Abstract:
The escalating complexity and frequency of cyber threats have exposed the limitations of traditional reactive cybersecurity measures, necessitating a shift toward proactive and predictive defence strategies. This research paper presents a comprehensive framework that integrates cybersecurity threat analysis and behavior analysis to address the dynamic and evolving nature of modern cyber risks. By combining advanced analytical techniques, such as time-series analysis and machine learning, with insights from behavioral psychology, this study aims to enhance threat detection, prediction, and miti
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Ravinder, and Rajvir Saini. "Analysis for Network Security Measures for Protecting Organizational Data." Journal of Lifestyle and SDGs Review 4, no. 4 (2024): e03599. http://dx.doi.org/10.47172/2965-730x.sdgsreview.v4.n04.pe03599.

Full text
Abstract:
Objectives: The number, severity, and sophistication of cybersecurity incidents are rising, suggesting that the next generation of cybersecurity threats cannot be fully mitigated by technical security controls alone. In order to strengthen cybersecurity in this day and age, end users must practise proper cyber hygiene. Methods: According to research, social culture affects reducing cybersecurity risk. The majority of research on the topic has been conducted in other nations, therefore it's possible that findings won't apply to India because of its distinct social and cultural norms. There is a
APA, Harvard, Vancouver, ISO, and other styles
7

Et. al., Siti Daleela Mohd Wahid,. "Cyber Security Behaviorin Online Distance Learning: Utilizing National E-Learning Policy." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (2021): 1719–28. http://dx.doi.org/10.17762/turcomat.v12i5.2167.

Full text
Abstract:
This present study discovers cybersecurity awareness in online distance learning (ODL) during the pandemic crisis. ODL is an excellent way of teaching and learning during this catastrophe. The Government has imposed the National E-learning Policy to support ODL procedures. Unfortunately, the policies have not been carefully planned on security elements. Therefore, by utilizing Information Security Awareness Capability Model and Situation Awareness-Oriented Cyber Security Education Model, we able to: (1) design the security elements for National e-Learning Policy (2) develop a conceptual model
APA, Harvard, Vancouver, ISO, and other styles
8

WAIZEL, GUY, and ADRIANA ZAIȚ. "POTENTIAL EFFECTS OF ADVANCED CYBERATTACKS ON CYBERSECURITY SOFTWARE BUYERS’ BEHAVIOUR." Review of Economic and Business Studies 17, no. 1 (2024): 43–61. https://doi.org/10.47743/rebs-2024-1-0002.

Full text
Abstract:
This research paper aims to develop a comprehensive understanding of cybersecurity buyer behavior by integrating multiple theories. Specifically, we examine the Theory of Buyer Behavior, the Theory of Reasoned Action, the Theory of Planned Behavior, the Stakeholder Theory, and their relevance in the context of advanced cybersecurity attacks. The paper proposes a new model, the Cybersecurity Buyer Behavior Effect Model (CB2EM), which synthesizes insights from these theories to predict the potential effect of advanced cybersecurity attacks, including zero-day supply chain attacks and stealth tec
APA, Harvard, Vancouver, ISO, and other styles
9

Ramalu, Subramaniam Sri, Norhaslinda Binti Zainal Abidin, Gunalan Nadarajah, and Amni Binti Anuar. "The Determinants of Risky Cybersecurity Behaviour: A Case Study Among Employees in Water Sector in Malaysia." Journal of Law and Sustainable Development 11, no. 12 (2023): e2706. http://dx.doi.org/10.55908/sdgs.v11i12.2706.

Full text
Abstract:
Objective: Cybersecurity threats are a growing concern around the world. Research found that the weakest element in the cybersecurity chain is that of the human. The use of security technologies failed to address the problem in instances where employees engage in activities that place themselves and the company at risk. Hence, the role human factors play in cybersecurity is crucial. The present study aims to examine the effects of information security issues awareness, top management support, leadership, information security policy and cybersecurity awareness training on risky cybersecurity be
APA, Harvard, Vancouver, ISO, and other styles
10

Feraru, Iulia, and Laura Bacali. "Explore the intersection of Self-Determination Theory and cybersecurity education - A literature review." International Journal of Advanced Statistics and IT&C for Economics and Life Sciences 14, no. 1 (2024): 55–77. https://doi.org/10.2478/ijasitels-2024-0017.

Full text
Abstract:
Abstract This paper explores how organizations can create a sustainable, security-first culture in an increasingly complex environment where organizational and national cultures are strong influencing factors in human behaviour. In cybersecurity education, as in any effort of education, there must be a principled commitment to long-term behaviour modification through intrinsic motivation, foundational to employees acting consistently in secure ways. The review of the literature falls squarely within Self-Determination Theory, underlining the pertinence of autonomy, competence, and relatedness
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity behaviour"

1

Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.

Full text
Abstract:
Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well as organizations. In recent years, we have seen a sharp increase in data breaches and cyber security threats that have targeted social media users. Hence, it is imperative that we try to better understand factors that affect an end-user’s adoption of effective security safeguards and privacy protection practices. In this research, we propose and validate a theoretical model that posits several determinants of end-user security and privacy pra
APA, Harvard, Vancouver, ISO, and other styles
2

Anuebunwa, Ugonna R. "Behavioural Demand Response for Future Smart Homes: Investigation of Demand Response Strategies for Future Smart Homes that Account for Consumer Comfort, Behaviour and Cybersecurity." Thesis, University of Bradford, 2018. http://hdl.handle.net/10454/17359.

Full text
Abstract:
Smart metering and precise measurement of energy consumption levels have brought more detailed information and interest on the actual load profile of a house which continues to improve consumer-retailer relationships. Participation in demand response (DR) programs is one of these relationships but studies have shown that there are considerable impacts resulting to some level of discomfort on consumers as they aim to follow a suggested load profile. This research therefore investigates the impact on consumers while participating in DR programs by evaluating various perspectives that includes:
APA, Harvard, Vancouver, ISO, and other styles
3

Shepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.

Full text
Abstract:
Background: Risky security behaviour displayed by end-users has the potential to leave devices vulnerable to compromise, despite the availability of security tools designed to aid users in defending themselves against potential online threats. This indicates a need to modify the behaviour of end-users, allowing them to consider the security implications of their actions online. Previous research has indicated affective feedback may serve as a successful method of educating users about risky security behaviours. Thus, by influencing end-users via affective feedback it may be possible to engage
APA, Harvard, Vancouver, ISO, and other styles
4

Howard, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.

Full text
Abstract:
As organizations have become more reliant on computers and technology to operate in a globalized world, they have also become more vulnerable to cyberattacks on their networks. The expense to organizations from cyberattacks now exceeds $400 billion USD annually. These costs highlight the need for behavioral research in the cyber domain. The first phase of this research developed an instrument to measure workers’ cybersecurity attitudes. An iterative process resulted in a scale with good psychometric properties - The Cybersecurity Attitudes Scale. The scale measures two factors: cyber policy ad
APA, Harvard, Vancouver, ISO, and other styles
5

Rajasooriya, Sasith Maduranga. "Cybersecurity: Probabilistic Behavior of Vulnerability and Life Cycle." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6933.

Full text
Abstract:
Analysis on Vulnerabilities and Vulnerability Life Cycle is at the core of Cybersecurity related studies. Vulnerability Life Cycle discussed by S. Frei and studies by several other scholars have noted the importance of this approach. Application of Statistical Methodologies in Cybersecurity related studies call for a greater deal of new information. Using currently available data from National Vulnerability Database this study develops and presents a set of useful Statistical tools to be applied in Cybersecurity related decision making processes. In the present study, the concept of Vulnerabil
APA, Harvard, Vancouver, ISO, and other styles
6

Das, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.

Full text
Abstract:
Despite substantial effort made by the usable security community at facilitating the use of recommended security systems and behaviors, much security advice is ignored and many security systems are underutilized. I argue that this disconnect can partially be explained by the fact that security behaviors have myriad unaccounted for social consequences. For example, by using two-factor authentication, one might be perceived as “paranoid”. By encrypting an e-mail correspondence, one might be perceived as having something to hide. Yet, to date, little theoretical work in usable security has applie
APA, Harvard, Vancouver, ISO, and other styles
7

Salameh, Rana. "THE RELATIONSHIP BETWEEN ENGAGMENT LEVELS AND PLAYERS’ INTENDED BEHAVIORS IN GAME-BASED TRAINING FOR CYBERSECURITY." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/dissertations/1761.

Full text
Abstract:
The purpose of this quantitative exploratory experimental design study was to examine the effects of end-user’s multi-dimension engagement (cognitive, affective, and behavioral) on their cybersecurity intended behaviors (coping and threat appraisals). Additionally, this study is an effort to understand how end-users’ engagement levels changed over multiple playing sessions. There were two research questions: (1) “Do engagement levels have a relationship with the players’ intended behaviors in a cybersecurity serious game?” and (2) “Does playing more sessions of cybersecurity serious game affec
APA, Harvard, Vancouver, ISO, and other styles
8

Kaluarachchi, Pubudu Kalpani. "Cybersecurity: Stochastic Analysis and Modelling of Vulnerabilities to Determine the Network Security and Attackers Behavior." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6862.

Full text
Abstract:
Development of Cybersecurity processes and strategies should take two main approaches. One is to develop an efficient and effective set of methodologies to identify software vulnerabilities and patch them before being exploited. Second is to develop a set of methodologies to predict the behavior of attackers and execute defending techniques based on attacking behavior. Managing of Vulnerabilities and analyzing them is directly related to the first approach. Developing of methodologies and models to predict the behavior of attackers is related to the second approach. Both these approaches are i
APA, Harvard, Vancouver, ISO, and other styles
9

Pacheco, Ramirez Jesus Horacio, and Ramirez Jesus Horacio Pacheco. "An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625581.

Full text
Abstract:
Advances in mobile and pervasive computing, social network technologies and the exponential growth in Internet applications and services will lead to the development of the Internet of Things (IoT). The IoT services will be a key enabling technology to the development of smart infrastructures that will revolutionize the way we do business, manage critical services, and how we secure, protect, and entertain ourselves. Large-scale IoT applications, such as critical infrastructures (e.g., smart grid, smart transportation, smart buildings, etc.) are distributed systems, characterized by interdepen
APA, Harvard, Vancouver, ISO, and other styles
10

Summers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Cybersecurity behaviour"

1

Forensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Routledge, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Forensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Taylor & Francis Group, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Forensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Taylor & Francis Group, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Forensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Taylor & Francis Group, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Watters, Paul, Dr Nalin Asanka Gamagedara Arachchilage, David Maimon, and Richard Keith Wortley, eds. Cognition, Behavior and Cybersecurity. Frontiers Media SA, 2021. http://dx.doi.org/10.3389/978-2-88971-412-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Davis, Adrian, Jessica Barker, Bruce Hallas, and Ciarán Mc Mahon. Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change. BCS Learning & Development Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

New Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. CRC Press LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

New Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. CRC Press LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

New Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

New Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Cybersecurity behaviour"

1

Donalds, Charlette, Corlane Barclay, and Kweku-Muata Osei-Bryson. "Cybersecurity Compliance Behaviour." In Cybercrime and Cybersecurity in the Global South. Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mashiane, Thulani, and Elmarie Kritzinger. "Cybersecurity Behaviour: A Conceptual Taxonomy." In Information Security Theory and Practice. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20074-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mashiane, Thulani, and Elamarie Kritzinger. "Theoretical Domains Framework Applied to Cybersecurity Behaviour." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51971-1_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, A. Lakshmana, G. Ramakrishnan, and Nikhil Kulshrestha. "Perception of Investment Behaviour in the Light of Corporate Frauds with Special Reference to India." In Cybersecurity, Law, and Economics. Routledge, 2024. http://dx.doi.org/10.4324/9781003517290-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alqahtani, Hamed, and Manolya Kavakli-Thorne. "Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?" In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mashiane, Thulani, and Elmarie Kritzinger. "Theoretical Domain Framework to Identify Cybersecurity Behaviour Constructs." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35343-8_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Krzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.

Full text
Abstract:
AbstractDetection of unknown attacks is challenging due to the lack of exemplary attack vectors. However, previously unknown attacks are a significant danger for systems due to a lack of tools for protecting systems against them, especially in fast-evolving Internet of Things (IoT) technology. The most widely used approach for malicious behaviour of the monitored system is detecting anomalies. The vicious behaviour might result from an attack (both known and unknown) or accidental breakdown. We present a Net Anomaly Detector (NAD) system that uses one-class classification Machine Learning techniques to detect anomalies in the network traffic. The highly modular architecture allows the system to be expanded with adapters for various types of networks. We propose and discuss multiple approaches for increasing detection quality and easing the component deployment in unknown networks by known attacks emulation, exhaustive feature extraction, hyperparameter tuning, detection threshold adaptation and ensemble models strategies. Furthermore, we present both centralized and decentralized deployment schemes and present preliminary results of experiments for the TCP/IP network traffic conducted on the CIC-IDS2017 dataset.
APA, Harvard, Vancouver, ISO, and other styles
8

Coventry, Lynne, Dawn Branley-Bell, Elizabeth Sillence, et al. "Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour." In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alshomrani, Nourah, Steven Furnell, and Ying He. "Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings." In HCI for Cybersecurity, Privacy and Trust. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35822-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Donalds, Charlette, Corlane Barclay, and Kweku-Muata Osei-Bryson. "Individual Decision-Making Styles and Employees' Security Compliance Behaviour." In Cybercrime and Cybersecurity in the Global South. Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity behaviour"

1

Zhang, Yuyan. "An Effective English Online user Learning Behaviour System using Random Forest and Extreme Gradient Boosting." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lang, Shanshan, and Xin Sui. "Recurrent Convolution Neural Network with Group-Wise Enhancement for Student English Classroom Learning Behavior Recognition." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jiang, Meng, Xin Yang, Peng Jiang, Fengbo Ma, and Shaojun Zhou. "Student Behavior Detection on Campus using Ghost Crayfish Optimization Algorithm and Bi Directional Long Short-Term Memory." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Enliang. "Prediction of Furniture Consumer Behavior Based on Machine Learning and Comparative Analysis of Models." In 2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing (CITSC). IEEE, 2025. https://doi.org/10.1109/citsc64390.2025.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hasibuan, Muhammad Dzifii, and Rio Guntur Utomo. "Analyzing the Impact of Cybersecurity Policies on Individual’s Behavior Through the Lens of Regulatory Focus Theory." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.

Full text
Abstract:
Abstract Secure edge devices and the need for hardware security are of paramount importance due to the growing demand for cybersecurity. Hardware security has been strengthened using complex architecture to provide uncompromisable security and prevent malicious cybersecurity attacks. To prevent unauthorized access using even the most advanced failure analysis (FA) techniques, the Hardware Security Module (HSM) implements cryptographic algorithms and data obfuscation using many raw combinational logic and state machines. When a newly taped-out device fails to operate or fails to come out of its
APA, Harvard, Vancouver, ISO, and other styles
7

Dlamini, Moses, Hein Venter, Jan Eloff, and Mariki Eloff. "Digital deception in cybersecurity: an information behaviour lens." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2018.

Full text
Abstract:
Introduction. Digital deception is a double-edged sword used by both blackhats and whitehats in cybersecurity. A status quo review of the reintroduction of digital deception can reveal challenges and initiatives and show how information behaviour expertise might inform cybersecurity research and vice versa. Aim. To use a status quo review of digital deception to reveal links between cybersecurity and information behaviour and to stimulate further research. Method. Critical review of digital deception in cybersecurity regarding whitehats and blackhats using an information behaviour lens. Findin
APA, Harvard, Vancouver, ISO, and other styles
8

Tripathy, Shyamasundar, Chintala Lakshmana Rao, Vikas Kumar, Pai H. Adity, Deepak Kumar, and Mimoh Jindal. "Investigating How Employees’ Cybersecurity Behaviour is Affected by Their Knowledge of Cybersecurity Policy." In 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2023. http://dx.doi.org/10.1109/ictbig59752.2023.10456050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shah, Pintu R., and Anuja Agarwal. "Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model." In 2020 3rd International Conference on Communication System, Computing and IT Applications (CSCITA). IEEE, 2020. http://dx.doi.org/10.1109/cscita47329.2020.9137773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chetwyn, Robert Andrew, Martin Eian, and Audun Jøsang. "Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon." In EICC 2024: European Interdisciplinary Cybersecurity Conference. ACM, 2024. http://dx.doi.org/10.1145/3655693.3655722.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity behaviour"

1

Keefer, Philip, Benjamin Roseth, and Julieth Santamaria. General Skills Training for Public Employees Experimental: Evidence on Cybersecurity Training in Argentina. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013202.

Full text
Abstract:
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from employee negligence. While strengthening cybersecurity through employee training is essential, traditional methods often fall short. In this study, we tested different approaches to reduce risk exposure to phishing, one of the most common types of cyberattacks, focusing on a sector and context unaddres
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!