Journal articles on the topic 'Cybersecurity behaviour'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cybersecurity behaviour.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Shah, Pintu, and Anuja Agarwal. "Cybersecurity behaviour of smartphone users in India: an empirical analysis." Information & Computer Security 28, no. 2 (2020): 293–318. http://dx.doi.org/10.1108/ics-04-2019-0041.
Full textBranley-Bell, Dawn, Lynne Coventry, Matt Dixon, Adam Joinson, and Pam Briggs. "Exploring Age and Gender Differences in ICT Cybersecurity Behaviour." Human Behavior and Emerging Technologies 2022 (October 21, 2022): 1–10. http://dx.doi.org/10.1155/2022/2693080.
Full textEt. al., Siti Daleela Mohd Wahid,. "Cyber Security Behaviorin Online Distance Learning: Utilizing National E-Learning Policy." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (2021): 1719–28. http://dx.doi.org/10.17762/turcomat.v12i5.2167.
Full textBranley-Bell, Dawn, Yolanda Gómez, Lynne Coventry, José Vila, and Pam Briggs. "Developing and Validating a Behavioural Model of Cyberinsurance Adoption." Sustainability 13, no. 17 (2021): 9528. http://dx.doi.org/10.3390/su13179528.
Full textOnumo, Aristotle, Irfan Ullah-Awan, and Andrea Cullen. "Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures." ACM Transactions on Management Information Systems 12, no. 2 (2021): 1–29. http://dx.doi.org/10.1145/3424282.
Full textEvans, Mark, Leandros A. Maglaras, Ying He, and Helge Janicke. "Human behaviour as an aspect of cybersecurity assurance." Security and Communication Networks 9, no. 17 (2016): 4667–79. http://dx.doi.org/10.1002/sec.1657.
Full textOlivares Rojas, Juan Carlos, ENRIQUE REYES ARCHUNDIA, JOSE ANTONIO GUTIERREZ GNECCHI, ARTURO MENDEZ PATIÑO, JAIME CERDA JACOBO, and ISMAEL MOLINA MORENO. "A METHODOLOGY FOR CYBER HYGIENE IN SMART GRIDS." DYNA 97, no. 1 (2022): 92–97. http://dx.doi.org/10.6036/10085.
Full textLie, Laksana Budiwiyono, Prio Utomo, and P. M. Winarno. "Investigating the Impact of Cybersecurity Culture on Employees’ Cybersecurity Protection Behaviours: A Conceptual Paper." Conference Series 3, no. 2 (2021): 295–305. http://dx.doi.org/10.34306/conferenceseries.v3i2.598.
Full textEggenschwiler, Jacqueline. "Expert commissions and norms of responsible behaviour in cyberspace: a review of the activities of the GCSC." Digital Policy, Regulation and Governance 22, no. 2 (2020): 93–107. http://dx.doi.org/10.1108/dprg-03-2019-0019.
Full textKasper, Agnes, Anna-Maria Osula, and Anna Molnár. "EU cybersecurity and cyber diplomacy." IDP Revista de Internet Derecho y Política, no. 34 (December 13, 2021): 1–15. http://dx.doi.org/10.7238/idp.v0i34.387469.
Full textAddae, Joyce Hoese, Michael Brown, Xu Sun, Dave Towey, and Milena Radenkovic. "Measuring attitude towards personal data for adaptive cybersecurity." Information & Computer Security 25, no. 5 (2017): 560–79. http://dx.doi.org/10.1108/ics-11-2016-0085.
Full textYounus, Ahmed Muayad, Ramzi Tarazi, Hala Younis, and Mohanad Abumandil. "The Role of Behavioural Intentions in Implementation of Bitcoin Digital Currency Factors in Terms of Usage and Acceptance in New Zealand: Cyber Security and Social Influence." ECS Transactions 107, no. 1 (2022): 10847–56. http://dx.doi.org/10.1149/10701.10847ecst.
Full textSulaiman, Noor Suhani, Muhammad Ashraf Fauzi, Walton Wider, Jegatheesan Rajadurai, Suhaidah Hussain, and Siti Aminah Harun. "Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review." Social Sciences 11, no. 9 (2022): 386. http://dx.doi.org/10.3390/socsci11090386.
Full textChowdhury, Noman H., Marc T. P. Adam, and Geoffrey Skinner. "The impact of time pressure on cybersecurity behaviour: a systematic literature review." Behaviour & Information Technology 38, no. 12 (2019): 1290–308. http://dx.doi.org/10.1080/0144929x.2019.1583769.
Full textBella, Giampaolo. "Out to explore the cybersecurity planet." Journal of Intellectual Capital 21, no. 2 (2020): 291–307. http://dx.doi.org/10.1108/jic-05-2019-0127.
Full textColes-Kemp, Lizzie, Debi Ashenden, and Kieron O'Hara. "Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen." Politics and Governance 6, no. 2 (2018): 41–48. http://dx.doi.org/10.17645/pag.v6i2.1333.
Full textKondrotas, Lukas. "European Union policy and the use of the normative power regarding cybersecurity." Análisis Jurídico - Político 4, no. 7 (2022): 143–68. http://dx.doi.org/10.22490/26655489.5504.
Full textBakalinska, Olha. "Current legal trends of cyber security and intellectual property." Theory and Practice of Intellectual Property, no. 5 (December 29, 2022): 82–92. http://dx.doi.org/10.33731/52022.270899.
Full textMphatheni, Mandlenkosi Richard, and Witness Maluleke. "Cybersecurity as a response to combating cybercrime." International Journal of Research in Business and Social Science (2147- 4478) 11, no. 4 (2022): 384–96. http://dx.doi.org/10.20525/ijrbs.v11i4.1714.
Full textCuinas, Inigo. "An Introduction to Cybersecurity at Physical Layer: Obstacles at Radio Channel to Mitigate Hackers’ Chance." Elektronika ir Elektrotechnika 26, no. 6 (2020): 58–65. http://dx.doi.org/10.5755/j01.eie.26.6.28006.
Full textVuță, Daniela Roxana, Eliza Nichifor, Ovidiu Mircea Țierean, et al. "Extending the Frontiers of Electronic Commerce Knowledge through Cybersecurity." Electronics 11, no. 14 (2022): 2223. http://dx.doi.org/10.3390/electronics11142223.
Full textReid, Rayne, and Johan Van Niekerk. "Decoding audience interpretations of awareness campaign messages." Information & Computer Security 24, no. 2 (2016): 177–93. http://dx.doi.org/10.1108/ics-01-2016-0003.
Full textNifakos, Sokratis, Krishna Chandramouli, Charoula Konstantina Nikolaou, et al. "Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review." Sensors 21, no. 15 (2021): 5119. http://dx.doi.org/10.3390/s21155119.
Full textChignell, Mark H., Mu-Huan Chung, Yuhong Yang, Greg Cento, and Abhay Raman. "Human Factors in Interactive Machine Learning: A Cybersecurity Case Study." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 1495–99. http://dx.doi.org/10.1177/1071181321651206.
Full textPadayachee, Keshnee. "Understanding the Relationship Between the Dark Triad of Personality Traits and Neutralization Techniques Toward Cybersecurity Behaviour." International Journal of Cyber Warfare and Terrorism 10, no. 4 (2020): 1–19. http://dx.doi.org/10.4018/ijcwt.2020100101.
Full textDzidzah, Esther, Kwame Owusu Kwateng, and Benjamin Kofi Asante. "Security behaviour of mobile financial service users." Information & Computer Security 28, no. 5 (2020): 719–41. http://dx.doi.org/10.1108/ics-02-2020-0021.
Full textGahardina, Ayu, and Ilman Zuhri Yadi. "Analisis Graph Clustering Terhadap User Behavior Di Official Account Facebook Universitas Bina Darma Palembang." Journal of Computer and Information Systems Ampera 1, no. 2 (2020): 63–76. http://dx.doi.org/10.51519/journalcisa.v1i2.35.
Full textHanzu-Pazara, Radu, Gabriel Raicu, and Remus Zagan. "The Impact of Human Behaviour on Cyber Security of the Maritime Systems." Advanced Engineering Forum 34 (October 2019): 267–74. http://dx.doi.org/10.4028/www.scientific.net/aef.34.267.
Full textMarnewick, Annlizé, and Suné Von Solms. "The Development of Cybersecurity Awareness Measurement Model in the Water Sector." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 211–18. http://dx.doi.org/10.34190/iccws.17.1.43.
Full textRobles-Durazno, Andres, Naghmeh Moradpoor, James McWhinnie, Gordon Russell, and Jorge Porcel-Bustamante. "Implementation and Evaluation of Physical, Hybrid, and Virtual Testbeds for Cybersecurity Analysis of Industrial Control Systems." Symmetry 13, no. 3 (2021): 519. http://dx.doi.org/10.3390/sym13030519.
Full textYuliana, Yuliana. "Pentingnya Kewaspadaan Berinternet untuk Kesehatan Mental Anak dan Remaja." Jurnal Ilmu Medis Indonesia 2, no. 1 (2022): 25–31. http://dx.doi.org/10.35912/jimi.v2i1.1218.
Full textVega Vega, Rafael Alejandro, Pablo Chamoso-Santos, Alfonso González Briones, et al. "Intrusion Detection with Unsupervised Techniques for Network Management Protocols over Smart Grids." Applied Sciences 10, no. 7 (2020): 2276. http://dx.doi.org/10.3390/app10072276.
Full textCervini, James, Aviel Rubin, and Lanier Watkins. "Don’t Drink the Cyber: Extrapolating the Possibilities of Oldsmar’s Water Treatment Cyberattack." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 19–25. http://dx.doi.org/10.34190/iccws.17.1.29.
Full textAdebiyi, Sulaimon Olanrewaju, and Gloria Amaka Olayemi. "Predicting the Consequences of Perceived Data Privacy Risks on Consumer Behaviour: An Entropy-TOPSIS Approach." Studia Humana 11, no. 2 (2022): 25–48. http://dx.doi.org/10.2478/sh-2022-0008.
Full textMulaji, Sarah Mulombo, and Sumarie Roodt. "Factors Affecting Organisations’ Adoption Behaviour toward Blockchain-Based Distributed Identity Management: The Sustainability of Self-Sovereign Identity in Organisations." Sustainability 14, no. 18 (2022): 11534. http://dx.doi.org/10.3390/su141811534.
Full textVisky, Gabor, Arturs Lavrenovs, Erwin Orye, Dan Heering, and Kimberly Tam. "Multi-Purpose Cyber Environment for Maritime Sector." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 349–57. http://dx.doi.org/10.34190/iccws.17.1.26.
Full textGerka, Alicja. "Searching for optimal machine learning algorithm for network traffic classification in intrusion detection system." ITM Web of Conferences 21 (2018): 00027. http://dx.doi.org/10.1051/itmconf/20182100027.
Full textde la Torre-Abaitua, Gonzalo, Luis F. Lago-Fernández, and David Arroyo. "On the application of compression-based metrics to identifying anomalous behaviour in web traffic." Logic Journal of the IGPL 28, no. 4 (2020): 546–57. http://dx.doi.org/10.1093/jigpal/jzz062.
Full textСтолярова, Валерия Фуатовна, Александра Витальевна Торопова, and Александр Львович Тулупьев. "A Model for Estimating the Posting Frequency in an Online Social Media with Incomplete Data Using Objective Determinants of Users’ Behaviour." Fuzzy Systems and Soft Computing, no. 2 (December 28, 2021): 77–95. http://dx.doi.org/10.26456/fssc81.
Full textMAROZ, Nataliya. "A Critical Analysis of the Need for a Stronger International Legal Framework for Cyber Ethics in Times of Pandemic." Revista Etică și Deontologie 2021, no. 1 (2021): 60–73. http://dx.doi.org/10.52744/red.2021.01.08.
Full textDr. Kiss, Attila, and Csaba Dr. Krasznay. "A felhasználói viselkedéselemzés kiberbiztonsági előnyei és adatvédelmi kihívásai." Információs Társadalom 17, no. 1 (2017): 55. http://dx.doi.org/10.22503/inftars.xvii.2017.1.4.
Full textBoakye-Boateng, Kwasi, Ali A. Ghorbani, and Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal." Journal of Sensor and Actuator Networks 11, no. 3 (2022): 34. http://dx.doi.org/10.3390/jsan11030034.
Full textGyőrffy, Krisztina, Ferenc Leitold, and Anthony Arrott. "Individual awareness of cyber-security vulnerability - Citizen and public servant." Central and Eastern European eDem and eGov Days 325 (February 14, 2018): 411–22. http://dx.doi.org/10.24989/ocg.v325.34.
Full textMashiane, Thulani, and Elmarie Kritzinger. "IDENTIFYING BEHAVIORAL CONSTRUCTS IN RELATION TO USER CYBERSECURITY BEHAVIOR." EURASIAN JOURNAL OF SOCIAL SCIENCES 9, no. 2 (2021): 98–122. http://dx.doi.org/10.15604/ejss.2021.09.02.004.
Full textRamlo, Susan, and John B. Nicholas. "The human factor: assessing individuals’ perceptions related to cybersecurity." Information & Computer Security 29, no. 2 (2021): 350–64. http://dx.doi.org/10.1108/ics-04-2020-0052.
Full textReeves, A., P. Delfabbro, and D. Calic. "Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue." SAGE Open 11, no. 1 (2021): 215824402110000. http://dx.doi.org/10.1177/21582440211000049.
Full textHe, Wu, Ivan Ash, Mohd Anwar, et al. "Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training." Journal of Intellectual Capital 21, no. 2 (2019): 203–13. http://dx.doi.org/10.1108/jic-05-2019-0112.
Full textAlhuwail, Dari, Eiman Al-Jafar, Yousef Abdulsalam, and Shaikha AlDuaij. "Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities." Applied Clinical Informatics 12, no. 04 (2021): 924–32. http://dx.doi.org/10.1055/s-0041-1735527.
Full textAntunes, Mário, Carina Silva, and Frederico Marques. "An Integrated Cybernetic Awareness Strategy to Assess Cybersecurity Attitudes and Behaviours in School Context." Applied Sciences 11, no. 23 (2021): 11269. http://dx.doi.org/10.3390/app112311269.
Full textMkhize, Simangele, and Nirmala Gopal. "Cyberbullying Perpetration: Children and Youth at Risk of Victimization during Covid-19 Lockdown." International Journal of Criminology and Sociology 10 (April 30, 2021): 525–37. http://dx.doi.org/10.6000/1929-4409.2021.10.61.
Full text