2023
DOI: 10.1080/19393555.2023.2222713
|View full text |Cite
|
Sign up to set email alerts
|

User perception of Context-Based Micro-Training – a method for cybersecurity training

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 50 publications
0
0
0
Order By: Relevance
“…Under such circumstances, employees might inadvertently bypass cybersecurity practices in a bid to manage their workload. This inadvertent neglect towards cybersecurity protocols can potentially heighten the susceptibility to cyber threats, highlighting the criticality of maintaining an optimal workload [41].…”
Section: Work Overload and Cybersecurity Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…Under such circumstances, employees might inadvertently bypass cybersecurity practices in a bid to manage their workload. This inadvertent neglect towards cybersecurity protocols can potentially heighten the susceptibility to cyber threats, highlighting the criticality of maintaining an optimal workload [41].…”
Section: Work Overload and Cybersecurity Behaviormentioning
confidence: 99%
“…This study used six items from cybersecurity behavior scales utilized in previous work [37,41,79,80]. Cronbach's alpha was 0.87.…”
Section: Cybersecurity Behavior (Time Point 3)mentioning
confidence: 99%