4.6 Article

Reconceptualizing cybersecurity awareness capability in the data-driven digital economy

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Cyber Security Awareness, Knowledge and Behavior: A Comparative Study

Moti Zwilling et al.

Summary: This study examines the relationship between cyber security awareness, knowledge, and behavior with protection tools among individuals, and finds that internet users possess adequate awareness but only apply minimal protective measures. The study also shows that higher cyber knowledge is connected to greater awareness, independent of country or gender differences. Awareness is linked to protection tools, but not to information disclosure.

JOURNAL OF COMPUTER INFORMATION SYSTEMS (2022)

Article Operations Research & Management Science

Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics

Shahriar Akter et al.

Summary: This study examines digital business transformation through the exploration of four emerging technologies: artificial intelligence, blockchain, cloud, and data analytics (ABCD). The findings highlight the wide-ranging applications and value propositions of these technologies in various vertical sectors, suggesting potential future research directions. Additionally, the study emphasizes the practical implications of these new technologies.

ANNALS OF OPERATIONS RESEARCH (2022)

Article Public, Environmental & Occupational Health

Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation

Mariana G. Cains et al.

Summary: This study utilized expert elicitation methods to define cyber security and cyber security risk, identifying key themes through data-driven thematic analysis and visualizing the interconnected themes using network analysis. The most salient themes for cyber security were context-driven, resilient system functionality, and maintenance of CIA, while for cyber security risk, the impacts of CIA vulnerabilities, probabilities of outcomes, and context-driven were highlighted. The process aimed to develop comprehensive definitions that encompassed contextual frameworks of all disciplines and explicitly incorporated human factors as significant cyber security risk factors.

RISK ANALYSIS (2022)

Article Computer Science, Interdisciplinary Applications

Cybersecurity awareness training programs: a cost-benefit analysis framework

Zuopeng (Justin) Zhang et al.

Summary: Through a cost-benefit analysis, the study classifies different types of CSAT programs to help organizations develop effective cybersecurity awareness training. Findings show that CSAT programs with different costs play a differing role in maintaining, upgrading or lowering a company's existing security level. Ideally, CSAT programs should allocate more expenses towards training employees to deal with security threats at lower security levels and reducing more losses at higher security levels.

INDUSTRIAL MANAGEMENT & DATA SYSTEMS (2021)

Article Information Science & Library Science

Exploring the Relationship Between Technology Adoption and Cyber Security Compliance: A Quantitative Study of UTAUT2 Model

Mohammed Saeed A. Alqahtani et al.

Summary: This study focuses on cyber security compliance in organizations, exploring factors that affect compliance and providing practical implications for technology developers and policymakers.

INTERNATIONAL JOURNAL OF ELECTRONIC GOVERNMENT RESEARCH (2021)

Proceedings Paper Computer Science, Cybernetics

Cloud Data Breach Disclosures: the Consumer and their Personally Identifiable Information (PII)?

David Kolevski et al.

Summary: The incidence of cloud computing data breaches is on the rise globally, with security becoming more crucial as companies rely on cloud services for agility and cost reduction. However, this also exposes millions of end-users' personally identifiable information to hacking risks. Despite attention brought by class action lawsuits, US courts still find it difficult to prove direct costs to individual users.

2021 IEEE CONFERENCE ON NORBERT WIENER IN THE 21ST CENTURY (21CW): BEING HUMAN IN A GLOBAL VILLAGE (2021)

Article Management

Dynamic managerial capabilities, organisational capacity for change and organisational performance: the moderating effect of attitude towards change in a public service organisation

Sunu Widianto et al.

Summary: This study focuses on the impact of dynamic managerial capabilities of middle managers on organizational performance, highlighting the mediating role of organizational capacity for change in the Indonesian context. It suggests that developing dynamic managerial capabilities among middle managers and empowering them through policy-making participation can enhance organizational performance.

JOURNAL OF ORGANIZATIONAL EFFECTIVENESS-PEOPLE AND PERFORMANCE (2021)

Article Computer Science, Information Systems

Toward a stage theory of the development of employees' information security behavior

Mari Karjalainen et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

A comprehensive model of information security factors for decision-makers

Rainer Diesch et al.

COMPUTERS & SECURITY (2020)

Article Chemistry, Multidisciplinary

SAWIT-Security Awareness Improvement Tool in the Workplace

Ana Kovacevic et al.

APPLIED SCIENCES-BASEL (2020)

Proceedings Paper Computer Science, Cybernetics

Evaluating the Information Security Awareness of Smartphone Users

Ron Bitton et al.

PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20) (2020)

Article Psychology, Applied

Exploring expert perceptions about the cyber security and privacy of Connected and Autonomous Vehicles: A thematic analysis approach

Na Liu et al.

TRANSPORTATION RESEARCH PART F-TRAFFIC PSYCHOLOGY AND BEHAVIOUR (2020)

Article Computer Science, Information Systems

Developing cybersecurity culture to influence employee behavior: A practice perspective

Moneer Alshaikh

COMPUTERS & SECURITY (2020)

Review Computer Science, Information Systems

Information and cyber security maturity models: a systematic literature review

Anass Rabii et al.

INFORMATION AND COMPUTER SECURITY (2020)

Article Psychology, Multidisciplinary

Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage

Guangyu Zhou et al.

FRONTIERS IN PSYCHOLOGY (2020)

Review Telecommunications

A systematic literature review of blockchain cyber security

Paul J. Taylor et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Review Computer Science, Information Systems

Review and insight on the behavioral aspects of cybersecurity

Rachid Ait Maalem Lahcen et al.

CYBERSECURITY (2020)

Article Psychology, Multidisciplinary

Knowledge absorption for cyber-security The role of human beliefs

Dimitri Percia David et al.

COMPUTERS IN HUMAN BEHAVIOR (2020)

Article Computer Science, Cybernetics

Using protection motivation theory in the design of nudges to improve online security behavior

Rene van Bavel et al.

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES (2019)

Article Computer Science, Information Systems

Enterprise cybersecurity training and awareness programs: Recommendations for success

Wu He et al.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2019)

Article Multidisciplinary Sciences

Effectiveness of and user preferences for security awareness training methodologies

Kai Florian Tschakert et al.

HELIYON (2019)

Proceedings Paper Computer Science, Information Systems

Cyber Security and Data Governance Roles and Responsibilities at the C-Level and the Board

Bhavani Thuraisingham

2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI) (2019)

Review Business

Literature review as a research methodology: An overview and guidelines

Hannah Snyder

JOURNAL OF BUSINESS RESEARCH (2019)

Article Multidisciplinary Sciences

Cyber security education is as essential as the three R's

Isabella M. Venter et al.

HELIYON (2019)

Proceedings Paper Automation & Control Systems

Cognisance as a Human Factor in Military Cyber Defence Education

Benjamin J. Knox et al.

IFAC PAPERSONLINE (2019)

Article Business

The role of B2B marketers in increasing cyber security awareness and influencing behavioural change

Peter R. J. Trim et al.

INDUSTRIAL MARKETING MANAGEMENT (2019)

Proceedings Paper Computer Science, Hardware & Architecture

The Future of Cybersecurity: Major Role of Artificial Intelligence, Machine Learning, and Deep Learning in Cyberspace

B. Geluvaraj et al.

INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018) (2019)

Article Business

Innovation, Dynamic Capabilities, and Leadership

Paul J. H. Schoemaker et al.

CALIFORNIA MANAGEMENT REVIEW (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Human Factors in Information Security Culture: A Literature Review

Henry W. Glaspie et al.

ADVANCES IN HUMAN FACTORS IN CYBERSECURITY (2018)

Article Computer Science, Information Systems

Graph-based visual analytics for cyber threat intelligence

Fabian Boehm et al.

CYBERSECURITY (2018)

Article Information Science & Library Science

Understanding key skills for information security managers

Husam Haqaf et al.

INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT (2018)

Editorial Material Health Care Sciences & Services

WannaCry, Cybersecurity and Health Information Technology: A Time to Act

Jesse M. Ehrenfeld

JOURNAL OF MEDICAL SYSTEMS (2017)

Proceedings Paper Computer Science, Software Engineering

An Effective Immersive Cyber Security Awareness Learning Platform for Businesses in the Hospitality Sector

Jack Holdsworth et al.

2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW) (2017)

Article Computer Science, Information Systems

Persona-centred information security awareness

Duncan Ki-Aries et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Psychological needs as motivators for security and privacy actions on smartphones

Lydia Kraus et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2017)

Article Computer Science, Information Systems

A general morphological analysis: delineating a cyber-security culture

Noluxolo Gcaza et al.

INFORMATION AND COMPUTER SECURITY (2017)

Article Computer Science, Information Systems

Managing information security awareness at an Australian bank: a comparative study

Malcolm Pattinson et al.

INFORMATION AND COMPUTER SECURITY (2017)

Article Psychology, Multidisciplinary

Gender difference and employees' cybersecurity behaviors

Mohd Anwar et al.

COMPUTERS IN HUMAN BEHAVIOR (2017)

Proceedings Paper Computer Science, Theory & Methods

Quantitative Assessment of Information Security Awareness on Informatics Students in a University

Arfive Gandhi

PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2017) (2017)

Article Engineering, Industrial

Measuring team effectiveness in cyber-defense exercises: a cross-disciplinary case study

Magdalena Granasen et al.

COGNITION TECHNOLOGY & WORK (2016)

Article Information Science & Library Science

A Study of Cyber Security Awareness in Educational Environment in the Middle East

Samaher Al-Janabi et al.

JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT (2016)

Article Psychology, Multidisciplinary

An information security knowledge sharing model in organizations

Nader Sohrabi Safa et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Operations Research & Management Science

Data governance activities: an analysis of the literature

Ibrahim Alhassan et al.

JOURNAL OF DECISION SYSTEMS (2016)

Article Psychology, Multidisciplinary

Phishing threat avoidance behaviour: An empirical investigation

Nalin Asanka Gamagedara Arachchilage et al.

COMPUTERS IN HUMAN BEHAVIOR (2016)

Article Computer Science, Information Systems

A system dynamics model for information security management

Derek L. Nazareth et al.

INFORMATION & MANAGEMENT (2015)

Article Computer Science, Information Systems

IMPACTS OF COMPREHENSIVE INFORMATION SECURITY PROGRAMS ON INFORMATION SECURITY CULTURE

Yan Chen et al.

JOURNAL OF COMPUTER INFORMATION SYSTEMS (2015)

Proceedings Paper Computer Science, Information Systems

Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures

Abdul Rahman Ahlan et al.

THIRD INFORMATION SYSTEMS INTERNATIONAL CONFERENCE 2015 (2015)

Article Business

MANAGERIAL COGNITIVE CAPABILITIES AND THE MICROFOUNDATIONS OF DYNAMIC CAPABILITIES

Constance E. Helfat et al.

STRATEGIC MANAGEMENT JOURNAL (2015)

Article Computer Science, Information Systems

Employees' adherence to information security policies: An exploratory field study

Mikko Siponen et al.

INFORMATION & MANAGEMENT (2014)

Article Business

WHAT ARE MICROFOUNDATIONS?

Jay Barney et al.

ACADEMY OF MANAGEMENT PERSPECTIVES (2013)

Article Business

Marketing and business performance

Neil A. Morgan

JOURNAL OF THE ACADEMY OF MARKETING SCIENCE (2012)

Review Business

Microfoundations of Routines and Capabilities: Individuals, Processes, and Structure

Teppo Felin et al.

JOURNAL OF MANAGEMENT STUDIES (2012)

Article Computer Science, Hardware & Architecture

Compliance with Information Security Policies: An Empirical Investigation

Mikko Siponen et al.

COMPUTER (2010)

Article Business

Corporate effects and dynamic managerial capabilities

R Adner et al.

STRATEGIC MANAGEMENT JOURNAL (2003)

Article Management

Deliberate learning and the evolution of dynamic capabilities

M Zollo et al.

ORGANIZATION SCIENCE (2002)

Article Business

Looking forward and looking backward: Cognitive and experiential search

G Gavetti et al.

ADMINISTRATIVE SCIENCE QUARTERLY (2000)