• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4719626)   Today's Articles (1045)
For: Gillam AR, Foster WT. Factors affecting risky cybersecurity behaviors by U.S. workers: An exploratory study. Computers in Human Behavior 2020. [DOI: 10.1016/j.chb.2020.106319] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
Number Cited by Other Article(s)
1
Dolezel D, Beauvais B, Stigler Granados P, Fulton L, Kruse CS. Effects of Internal and External Factors on Hospital Data Breaches: Quantitative Study. J Med Internet Res 2023;25:e51471. [PMID: 38127426 PMCID: PMC10767628 DOI: 10.2196/51471] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2023] [Revised: 11/06/2023] [Accepted: 11/13/2023] [Indexed: 12/23/2023]  Open
2
Almansoori A, Al-Emran M, Shaalan K. Exploring the Frontiers of Cybersecurity Behavior: A Systematic Review of Studies and Theories. APPLIED SCIENCES 2023;13:5700. [DOI: 10.3390/app13095700] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
3
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach. COMPUTERS IN HUMAN BEHAVIOR 2023. [DOI: 10.1016/j.chb.2023.107702] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
4
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103378] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
5
Khan NF, Ikram N, Saleem S, Zafar S. Cyber-security and risky behaviors in a developing country context: a Pakistani perspective. SECURITY JOURNAL 2022. [PMCID: PMC9148392 DOI: 10.1057/s41284-022-00343-4] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 05/06/2022] [Indexed: 06/18/2023]
6
Goel L, Zhang JZ, Williamson S. IT assimilation: construct, measurement, and implications in cybersecurity. ENTERP INF SYST-UK 2022. [DOI: 10.1080/17517575.2022.2052187] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
7
Palanisamy R, Norman AA, Mat Kiah L. BYOD Security Risks and Mitigation Strategies: Insights from IT Security Experts. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE 2022. [DOI: 10.1080/10919392.2022.2028530] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
8
Lee CS, Kim D. Pathways to Cybersecurity Awareness and Protection Behaviors in South Korea. JOURNAL OF COMPUTER INFORMATION SYSTEMS 2022. [DOI: 10.1080/08874417.2022.2031347] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
9
Yan Z, Yang P, Xue Y, Lou Y, Nealon M. Validity and reliability of Cybersecurity Judgment Questionnaire for middle and high school students: A validation study with Rasch analysis. HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES 2021. [DOI: 10.1002/hbe2.312] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
10
Chan EY, Palmeira M. Political ideology moderates consumer response to brand crisis apologies for data breaches. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106801] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
11
Yan Z, Xue Y, Lou Y. Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106791] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA