Academic literature on the topic 'Cybersecurity behaviour'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity behaviour.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity behaviour"
Sajikumar, Sariga, N. Ajithkumar, and Gopu Vijayan. "Exploring the Interplay of Privacy Concerns, Mobile Cybersecurity Awareness, and Protective Motivation Behavior." International Journal of Religion 5, no. 5 (2024): 612–19. http://dx.doi.org/10.61707/kqyq0505.
Full textShah, Pintu, and Anuja Agarwal. "Cybersecurity behaviour of smartphone users in India: an empirical analysis." Information & Computer Security 28, no. 2 (2020): 293–318. http://dx.doi.org/10.1108/ics-04-2019-0041.
Full textBranley-Bell, Dawn, Lynne Coventry, Matt Dixon, Adam Joinson, and Pam Briggs. "Exploring Age and Gender Differences in ICT Cybersecurity Behaviour." Human Behavior and Emerging Technologies 2022 (October 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/2693080.
Full textAustin Oguejiofor Amaechi. "A methodological framework for fostering cybersecurity mindsets and behaviour." International Journal of Science and Research Archive 15, no. 2 (2025): 1799–810. https://doi.org/10.30574/ijsra.2025.15.2.1659.
Full textB.S.Mounika Yadav, Komali Guthikonda, and Venu Matta. "Cybersecurity Threat Analysis and Behaviour Analysis: A Comprehensive Approach to Proactive Défense." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 67–70. https://doi.org/10.46647/ijetms.2025.v09si01.010.
Full textSharma, Ravinder, and Rajvir Saini. "Analysis for Network Security Measures for Protecting Organizational Data." Journal of Lifestyle and SDGs Review 4, no. 4 (2024): e03599. http://dx.doi.org/10.47172/2965-730x.sdgsreview.v4.n04.pe03599.
Full textEt. al., Siti Daleela Mohd Wahid,. "Cyber Security Behaviorin Online Distance Learning: Utilizing National E-Learning Policy." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (2021): 1719–28. http://dx.doi.org/10.17762/turcomat.v12i5.2167.
Full textWAIZEL, GUY, and ADRIANA ZAIȚ. "POTENTIAL EFFECTS OF ADVANCED CYBERATTACKS ON CYBERSECURITY SOFTWARE BUYERS’ BEHAVIOUR." Review of Economic and Business Studies 17, no. 1 (2024): 43–61. https://doi.org/10.47743/rebs-2024-1-0002.
Full textRamalu, Subramaniam Sri, Norhaslinda Binti Zainal Abidin, Gunalan Nadarajah, and Amni Binti Anuar. "The Determinants of Risky Cybersecurity Behaviour: A Case Study Among Employees in Water Sector in Malaysia." Journal of Law and Sustainable Development 11, no. 12 (2023): e2706. http://dx.doi.org/10.55908/sdgs.v11i12.2706.
Full textFeraru, Iulia, and Laura Bacali. "Explore the intersection of Self-Determination Theory and cybersecurity education - A literature review." International Journal of Advanced Statistics and IT&C for Economics and Life Sciences 14, no. 1 (2024): 55–77. https://doi.org/10.2478/ijasitels-2024-0017.
Full textDissertations / Theses on the topic "Cybersecurity behaviour"
Akbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.
Full textAnuebunwa, Ugonna R. "Behavioural Demand Response for Future Smart Homes: Investigation of Demand Response Strategies for Future Smart Homes that Account for Consumer Comfort, Behaviour and Cybersecurity." Thesis, University of Bradford, 2018. http://hdl.handle.net/10454/17359.
Full textShepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.
Full textHoward, David J. "Development of the Cybersecurity Attitudes Scale and Modeling Cybersecurity Behavior and its Antecedents." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7306.
Full textRajasooriya, Sasith Maduranga. "Cybersecurity: Probabilistic Behavior of Vulnerability and Life Cycle." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6933.
Full textDas, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.
Full textSalameh, Rana. "THE RELATIONSHIP BETWEEN ENGAGMENT LEVELS AND PLAYERS’ INTENDED BEHAVIORS IN GAME-BASED TRAINING FOR CYBERSECURITY." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/dissertations/1761.
Full textKaluarachchi, Pubudu Kalpani. "Cybersecurity: Stochastic Analysis and Modelling of Vulnerabilities to Determine the Network Security and Attackers Behavior." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6862.
Full textPacheco, Ramirez Jesus Horacio, and Ramirez Jesus Horacio Pacheco. "An Anomaly Behavior Analysis Methodology for the Internet of Things: Design, Analysis, and Evaluation." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625581.
Full textSummers, Timothy Corneal. "HOW HACKERS THINK: A MIXED METHOD STUDY OF MENTAL MODELSAND COGNITIVE PATTERNS OF HIGH-TECH WIZARDS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=case1427809862.
Full textBooks on the topic "Cybersecurity behaviour"
Forensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Routledge, 2024.
Find full textForensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Taylor & Francis Group, 2024.
Find full textForensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Taylor & Francis Group, 2024.
Find full textForensic Perspectives on Cybercrime: Human Behaviour and Cybersecurity. Taylor & Francis Group, 2024.
Find full textWatters, Paul, Dr Nalin Asanka Gamagedara Arachchilage, David Maimon, and Richard Keith Wortley, eds. Cognition, Behavior and Cybersecurity. Frontiers Media SA, 2021. http://dx.doi.org/10.3389/978-2-88971-412-4.
Full textDavis, Adrian, Jessica Barker, Bruce Hallas, and Ciarán Mc Mahon. Cybersecurity ABCs: Delivering Awareness, Behaviours and Culture Change. BCS Learning & Development Limited, 2021.
Find full textNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. CRC Press LLC, 2023.
Find full textNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. CRC Press LLC, 2023.
Find full textNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. Taylor & Francis Group, 2023.
Find full textNew Perspectives in Behavioral Cybersecurity: Human Behavior and Decision-Making Models. Taylor & Francis Group, 2023.
Find full textBook chapters on the topic "Cybersecurity behaviour"
Donalds, Charlette, Corlane Barclay, and Kweku-Muata Osei-Bryson. "Cybersecurity Compliance Behaviour." In Cybercrime and Cybersecurity in the Global South. Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-8.
Full textMashiane, Thulani, and Elmarie Kritzinger. "Cybersecurity Behaviour: A Conceptual Taxonomy." In Information Security Theory and Practice. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20074-9_11.
Full textMashiane, Thulani, and Elamarie Kritzinger. "Theoretical Domains Framework Applied to Cybersecurity Behaviour." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51971-1_34.
Full textRao, A. Lakshmana, G. Ramakrishnan, and Nikhil Kulshrestha. "Perception of Investment Behaviour in the Light of Corporate Frauds with Special Reference to India." In Cybersecurity, Law, and Economics. Routledge, 2024. http://dx.doi.org/10.4324/9781003517290-6.
Full textAlqahtani, Hamed, and Manolya Kavakli-Thorne. "Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?" In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_3.
Full textMashiane, Thulani, and Elmarie Kritzinger. "Theoretical Domain Framework to Identify Cybersecurity Behaviour Constructs." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-35343-8_34.
Full textKrzysztoń, Mateusz, Marcin Lew, and Michał Marks. "NAD: Machine Learning Based Component for Unknown Attack Detection in Network Traffic." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_4.
Full textCoventry, Lynne, Dawn Branley-Bell, Elizabeth Sillence, et al. "Cyber-Risk in Healthcare: Exploring Facilitators and Barriers to Secure Behaviour." In HCI for Cybersecurity, Privacy and Trust. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50309-3_8.
Full textAlshomrani, Nourah, Steven Furnell, and Ying He. "Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings." In HCI for Cybersecurity, Privacy and Trust. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-35822-7_36.
Full textDonalds, Charlette, Corlane Barclay, and Kweku-Muata Osei-Bryson. "Individual Decision-Making Styles and Employees' Security Compliance Behaviour." In Cybercrime and Cybersecurity in the Global South. Routledge, 2022. http://dx.doi.org/10.1201/9781003028710-9.
Full textConference papers on the topic "Cybersecurity behaviour"
Zhang, Yuyan. "An Effective English Online user Learning Behaviour System using Random Forest and Extreme Gradient Boosting." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939694.
Full textLang, Shanshan, and Xin Sui. "Recurrent Convolution Neural Network with Group-Wise Enhancement for Student English Classroom Learning Behavior Recognition." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939155.
Full textJiang, Meng, Xin Yang, Peng Jiang, Fengbo Ma, and Shaojun Zhou. "Student Behavior Detection on Campus using Ghost Crayfish Optimization Algorithm and Bi Directional Long Short-Term Memory." In 2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity (ICDSCNC). IEEE, 2024. https://doi.org/10.1109/icdscnc62492.2024.10939745.
Full textTian, Enliang. "Prediction of Furniture Consumer Behavior Based on Machine Learning and Comparative Analysis of Models." In 2025 Asia-Europe Conference on Cybersecurity, Internet of Things and Soft Computing (CITSC). IEEE, 2025. https://doi.org/10.1109/citsc64390.2025.00014.
Full textHasibuan, Muhammad Dzifii, and Rio Guntur Utomo. "Analyzing the Impact of Cybersecurity Policies on Individual’s Behavior Through the Lens of Regulatory Focus Theory." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929109.
Full textSampath, Amrutha, Kristofor Dickson, George W. Lange, Carey Wu, and Keith A. Serrels. "Evaluation of the Analyzability of Complex Secure Intellectual Property Using Fault Isolation Techniques versus the Hardware Security Threat They Pose." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0385.
Full textDlamini, Moses, Hein Venter, Jan Eloff, and Mariki Eloff. "Digital deception in cybersecurity: an information behaviour lens." In ISIC: the Information Behaviour Conference. University of Borås, Borås, Sweden, 2020. http://dx.doi.org/10.47989/irisic2018.
Full textTripathy, Shyamasundar, Chintala Lakshmana Rao, Vikas Kumar, Pai H. Adity, Deepak Kumar, and Mimoh Jindal. "Investigating How Employees’ Cybersecurity Behaviour is Affected by Their Knowledge of Cybersecurity Policy." In 2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2023. http://dx.doi.org/10.1109/ictbig59752.2023.10456050.
Full textShah, Pintu R., and Anuja Agarwal. "Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model." In 2020 3rd International Conference on Communication System, Computing and IT Applications (CSCITA). IEEE, 2020. http://dx.doi.org/10.1109/cscita47329.2020.9137773.
Full textChetwyn, Robert Andrew, Martin Eian, and Audun Jøsang. "Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon." In EICC 2024: European Interdisciplinary Cybersecurity Conference. ACM, 2024. http://dx.doi.org/10.1145/3655693.3655722.
Full textReports on the topic "Cybersecurity behaviour"
Keefer, Philip, Benjamin Roseth, and Julieth Santamaria. General Skills Training for Public Employees Experimental: Evidence on Cybersecurity Training in Argentina. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013202.
Full text