BACKGROUND: With the ever-expanding interconnectedness of the internet and especially with the recent development of the Internet of Things, people are increasingly at risk for cybersecurity breaches that can have far-reaching consequences for their personal and professional lives, with psychological and mental health ramifications. OBJECTIVE: We aimed to identify the dimensional structure of emotion processes triggered by one of the most emblematic scenarios of cybersecurity breach, the hacking of one's smart security camera, and explore which personality characteristics systematically relate to these emotion dimensions. METHODS: A total of 902 participants from the United Kingdom and the Netherlands reported their emotion processes trigge...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
The current research aims to gain insight on the role of the five personality traits (conscientiousn...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
BACKGROUND: With the ever-expanding interconnectedness of the internet and especially with the recen...
Background: With the ever-expanding interconnectedness of the internet and especially with the recen...
This study investigated emotional reactions to cybersecurity breaches. Based on prior research, a co...
The increasing adoption of IoT devices in households has the potential to make life easier and more ...
Cyber attacks are increasingly commonplace and cause significant disruption, and therefore, have bee...
This paper reports on a three-part investigation into people’s perceptions of cybersecurity, based o...
Interest in the individual differences underlying end user computer security behavior has led to the...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Organizations have become increasingly concerned with developing and protecting their information se...
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studie...
Security is a priority to most, but studies show that users commonly fail to adopt recommended cyber...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
The current research aims to gain insight on the role of the five personality traits (conscientiousn...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...
BACKGROUND: With the ever-expanding interconnectedness of the internet and especially with the recen...
Background: With the ever-expanding interconnectedness of the internet and especially with the recen...
This study investigated emotional reactions to cybersecurity breaches. Based on prior research, a co...
The increasing adoption of IoT devices in households has the potential to make life easier and more ...
Cyber attacks are increasingly commonplace and cause significant disruption, and therefore, have bee...
This paper reports on a three-part investigation into people’s perceptions of cybersecurity, based o...
Interest in the individual differences underlying end user computer security behavior has led to the...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it ...
Organizations have become increasingly concerned with developing and protecting their information se...
Cybercrime has rapidly grown in prevalence and potential for harm and disruption for victims. Studie...
Security is a priority to most, but studies show that users commonly fail to adopt recommended cyber...
In this digital age, information is transferred with such ease and speed that security is rarely tak...
The current research aims to gain insight on the role of the five personality traits (conscientiousn...
The present study explored the relationship between risky cybersecurity behaviours, attitudes toward...