This paper reports on a three-part investigation into people’s perceptions of cybersecurity, based on their lived experiences. We sought thereby to reveal issues located within the Johari grid’s “Blind Spot” quadrant. We utilized research methodologies from both the Arts and Science in order firstly to identify blind spot issues, and secondly to explore their dimensions. Our investigation confirmed a number of aspects that we were indeed aware of, when it came to people’s lived cybersecurity experiences. We also identified one particular blind spot issue: widespread, but not universal, negativity towards cybersecurity. We then carried out an investigation using a recognized methodology from psychology, as a first attempt to assess the natur...
Purpose: This paper presents an initial development of a Personal Data Attitude (PDA) measurement in...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...
This paper reports on a three-part investigation into people's perceptions of cybersecurity, based o...
This study investigated emotional reactions to cybersecurity breaches. Based on prior research, a co...
Background: With the ever-expanding interconnectedness of the internet and especially with the recen...
BACKGROUND: With the ever-expanding interconnectedness of the internet and especially with the recen...
As organizations have become more reliant on computers and technology to operate in a globalized wor...
The increasing adoption of IoT devices in households has the potential to make life easier and more ...
Security is a priority to most, but studies show that users commonly fail to adopt recommended cyber...
With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the ...
Risk perception is an important driver of netizens' (Internet users') cybersecurity behaviours, with...
This paper reports on a mixed-method research project that examined the attitudes of computer users ...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...
While modern society benefits from a range of technological advancements, it also is exposed to an e...
Purpose: This paper presents an initial development of a Personal Data Attitude (PDA) measurement in...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...
This paper reports on a three-part investigation into people's perceptions of cybersecurity, based o...
This study investigated emotional reactions to cybersecurity breaches. Based on prior research, a co...
Background: With the ever-expanding interconnectedness of the internet and especially with the recen...
BACKGROUND: With the ever-expanding interconnectedness of the internet and especially with the recen...
As organizations have become more reliant on computers and technology to operate in a globalized wor...
The increasing adoption of IoT devices in households has the potential to make life easier and more ...
Security is a priority to most, but studies show that users commonly fail to adopt recommended cyber...
With the prevalence and significance of cybercrimes increasing, cybersecurity has become one of the ...
Risk perception is an important driver of netizens' (Internet users') cybersecurity behaviours, with...
This paper reports on a mixed-method research project that examined the attitudes of computer users ...
Cybersecurity incidents may seem very technological in nature, but ultimately the hackers and the or...
While modern society benefits from a range of technological advancements, it also is exposed to an e...
Purpose: This paper presents an initial development of a Personal Data Attitude (PDA) measurement in...
Cybersecurity have drawn special attention of organizations in the 21st century because of the preva...
Individual internet users are commonly considered the weakest links in the cybersecurity chain. One ...