Jan 3, 2024 | Conference proceedings, Research library
Cookies are essential to the modern internet. People use cookies and other tracking technologies to integrate the browsing experience of websites, present personalized content and targeted advertising, understand the origin of their audience, and analyze web traffic....
Dec 15, 2023 | Conference proceedings, Research library
Extensive research has been performed to examine the effectiveness of phishing defenses, but much of this research was performed in laboratory settings. In contrast, this work presents 4.5 years of workplace-situated, embedded phishing email training exercise data,...
Nov 24, 2023 | Conference proceedings, Research library
To make employees aware of their important role for information security, companies typically carry out security awareness campaigns. The success and effectiveness of those campaigns has to be measured to justify the budget for example. Therefore, we did a systematic...
Oct 3, 2021 | Conference proceedings, Research library
This study investigates the perception of cyber security among MSMEs, particularly those new to technology, utilizing the Protection Motivation Theory (PMT) model. Data is gathered through surveys and analyzed quantitatively using Smart-PLS software. Several variables...
Jul 11, 2021 | Conference proceedings, Research library
Small to Medium Enterprises (SMEs) constitute a significant portion of a country’s business activity and make a substantial contribution to the national supply chain. Despite their importance, there is a notable lack of comprehensive studies and reports that...
Jul 3, 2021 | Conference proceedings, Journal article, Research library
Cybersecurity is an escalating concern in today’s technology-driven world, spanning consumer, corporate, and military domains. A literature review focused on human responses to cybersecurity incidents reveals a three-phase process in cybersecurity response: 1....