Due to recent advances in online communication technology, social networks have become a vital avenue for human interaction. At the same time, they have been exploited as a target for viruses, attacks, and security threats. The first line of defense against such attacks and threats— as well as their primary cause—are social media users themselves. This study investigated the relationship between certain personality factors among social media users—i.e., technology acceptance of security protection technologies, self-efficacy of information security, and locus of control—and their information security behavior. Quantitative methods were used to examine this relationship. The population consisted of all students attending a public university ...
Social engineering is a growing source of information security concern. Exploits appear to evolve, w...
In accordance with a similar growth in information technology, computer hacking has become a pervasi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
The aim of the research was to examine some correlates of security awareness and risky behavior whil...
Internet users face threats of increasing complexity and severity. To protect themselves they rely o...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
Online social networking develops interactions and communication approaches. Online environment is t...
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University...
With the daily use of social media, the cybersecurity and privacy are challenging for most communiti...
The overall security posture of information systems (IS) depends on the behaviors of the IS users. S...
It is widely acknowledged that non-compliance with smartphone security behaviors is widespread and m...
This paper examines factors correlated with online self-help—an informal form of social control vis-...
While extant literature on privacy in social networks is plentiful, issues pertaining to information...
Social engineering is a growing source of information security concern. Exploits appear to evolve, w...
In accordance with a similar growth in information technology, computer hacking has become a pervasi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...
The ever-increasing number and severity of cybersecurity breaches makes it vital to understand the f...
The aim of the research was to examine some correlates of security awareness and risky behavior whil...
Internet users face threats of increasing complexity and severity. To protect themselves they rely o...
Cybersecurity attacks have increased as Internet technology has proliferated. Symantec’s 2013 Intern...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
Online social networking develops interactions and communication approaches. Online environment is t...
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University...
With the daily use of social media, the cybersecurity and privacy are challenging for most communiti...
The overall security posture of information systems (IS) depends on the behaviors of the IS users. S...
It is widely acknowledged that non-compliance with smartphone security behaviors is widespread and m...
This paper examines factors correlated with online self-help—an informal form of social control vis-...
While extant literature on privacy in social networks is plentiful, issues pertaining to information...
Social engineering is a growing source of information security concern. Exploits appear to evolve, w...
In accordance with a similar growth in information technology, computer hacking has become a pervasi...
Effective information security (InfoSec) management cannot be achieved through only technology; peop...