In light of the growing epidemic of cyberattacks, it is important to understand how different groups within the general population connect information with attitudes and behaviors. Internet transactions become less of an option and more of a requirement for consumers and the workforce. This study explored the connection between awareness, experience, and trust with the goal of identifying communication strategies that will ultimately steer consumers toward healthy cyberbehaviors. Consumer trust in government and business organizations is the desired status quo for everyone. Awareness and experience are important modifying factors and both are addressable through strategic consumer communication campaigns. Understanding the different ways me...
The projects aim is to understand how gender may impact decision making within e-commerce. Current l...
The pervasiveness of the World Wide Web (internet) with the easy flow of information means that ther...
This research focused on examining attitudinal differences of Internet utilization and security with...
Privacy is defined as a two-dimensional construct, involving physical space and information (Goodwin...
Human compliance in cybersecurity continues to be a persistent problem for organizations. This resea...
As organizations continue to grapple with the escalating threat landscape of cyber-attacks, the impe...
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of ...
Consumer cyber protection as it relates to the threat of cyber insecurity is an increasingly critica...
The effective delivery of health care relies on sharing electronic health records across multiple pr...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...
The Internet is becoming increasingly connected to people in the daily life of many individuals, or...
This presentation examines the cybersecurity measures used by varying organizations to determine whi...
Despite multiple national, educational, and industry initiatives, women continue to be underrepresen...
Cybersecurity contains two primary components: the technical side and the management/behavioral side...
The human component of information systems is a target of cyberattacks. Firms address the threat usi...
The projects aim is to understand how gender may impact decision making within e-commerce. Current l...
The pervasiveness of the World Wide Web (internet) with the easy flow of information means that ther...
This research focused on examining attitudinal differences of Internet utilization and security with...
Privacy is defined as a two-dimensional construct, involving physical space and information (Goodwin...
Human compliance in cybersecurity continues to be a persistent problem for organizations. This resea...
As organizations continue to grapple with the escalating threat landscape of cyber-attacks, the impe...
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of ...
Consumer cyber protection as it relates to the threat of cyber insecurity is an increasingly critica...
The effective delivery of health care relies on sharing electronic health records across multiple pr...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...
The Internet is becoming increasingly connected to people in the daily life of many individuals, or...
This presentation examines the cybersecurity measures used by varying organizations to determine whi...
Despite multiple national, educational, and industry initiatives, women continue to be underrepresen...
Cybersecurity contains two primary components: the technical side and the management/behavioral side...
The human component of information systems is a target of cyberattacks. Firms address the threat usi...
The projects aim is to understand how gender may impact decision making within e-commerce. Current l...
The pervasiveness of the World Wide Web (internet) with the easy flow of information means that ther...
This research focused on examining attitudinal differences of Internet utilization and security with...