2020
DOI: 10.1080/08874417.2020.1712269
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Awareness, Knowledge and Behavior: A Comparative Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

9
90
0
5

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 198 publications
(152 citation statements)
references
References 37 publications
9
90
0
5
Order By: Relevance
“…Cybersecurity personalities (e.g. Cain et al, 2018;Zwilling et al, 2020) supports such argument that threat knowledge affects people to engage in cyber protection behaviors.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations
“…Cybersecurity personalities (e.g. Cain et al, 2018;Zwilling et al, 2020) supports such argument that threat knowledge affects people to engage in cyber protection behaviors.…”
Section: Introductionmentioning
confidence: 93%
“…Within the context of the sudden migration of schools to remote education, the increasing demand for internet connectivity and even technology by students has widened opportunities for internet usage. The students in the process have become vulnerable to cyber threats and hazards (Zwilling et al, 2020). A review stresses that since COVID-19 spread, there has been an alarming increase in the number of cybercrime incidents (Hajj & Rony, 2020).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Following various authors' propositions for scholars to develop internet-based cyber-training programs to assist students in higher education with CSA, [29][30][31] the study hypothesized a model to proffer theoretical and practical solutions to higher education students on cybersecurity training programs. Our hypotheses are as follows: The researcher's study model is shown in Figure 1.…”
Section: Research Model and Hypothesismentioning
confidence: 99%
“…The consequences of these types of attack brought in what the cyber-security research community referred to as a ‘game changer’ in cyber-attack dynamics, highlighting the strong need for personnel training [ 3 , 4 , 5 ]. Furthermore, in the recent past, the cyber-security industry has undergone a significant shift in respect of acknowledging the importance of security training of users, transitioning from “users are the weak link of cyber-security” towards “users can be trained like muscles hence, improving a company’s overall security posture” [ 6 , 7 ]. The evolving change of stance is a fundamental trigger for change in cyber-security procedures, in turn stimulating a growing demand for training platforms.…”
Section: Introductionmentioning
confidence: 99%