The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the factors that make organizations vulnerable. Since humans are considered the weakest link in the cybersecurity chain of an organization, this study evaluates users’ individual differences (demographic factors, risk-taking preferences, decision-making styles and personality traits) to understand online security behavior. This thesis studies four different yet tightly related online security behaviors that influence organizational cybersecurity: device securement, password generation, proactive awareness and updating. A survey (N=369) of students, faculty and staff in a large mid-Atlantic U.S. public university identifies individual characteristi...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
Target Corporation experienced an information security breach resulting in compromising customers\u2...
As organizational security breaches increase, it becomes imperative to understand the factors that l...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
Cybercriminals threaten strategic and efficient use of the Internet within the business environment....
Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensiti...
Valuable information, such as user authentication credentials and personal sensitive information, ca...
This paper presents a set of statistical analyses on an empirical study of phishing email sorting by...
Due to recent advances in online communication technology, social networks have become a vital avenu...
Organizations have become increasingly concerned with developing and protecting their information se...
Information security has for long time been a field of study in computer science, software engineeri...
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either...
Information security has for long time been a field of study in computer science, software engineeri...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
Target Corporation experienced an information security breach resulting in compromising customers\u2...
As organizational security breaches increase, it becomes imperative to understand the factors that l...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
Cybercriminals threaten strategic and efficient use of the Internet within the business environment....
Between January 2017 and March 2018, it is estimated that more than 1.9 billion personal and sensiti...
Valuable information, such as user authentication credentials and personal sensitive information, ca...
This paper presents a set of statistical analyses on an empirical study of phishing email sorting by...
Due to recent advances in online communication technology, social networks have become a vital avenu...
Organizations have become increasingly concerned with developing and protecting their information se...
Information security has for long time been a field of study in computer science, software engineeri...
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either...
Information security has for long time been a field of study in computer science, software engineeri...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
Target Corporation experienced an information security breach resulting in compromising customers\u2...