Insubordinate 发表于 2025-3-27 00:56:14
http://reply.papertrans.cn/43/4290/428969/428969_31.pngAnticonvulsants 发表于 2025-3-27 03:04:08
http://reply.papertrans.cn/43/4290/428969/428969_32.png根除 发表于 2025-3-27 05:44:54
Cyber4Dev Security Culture Model for African Countriesstrong information security culture within organizations will assist in reducing the effects of human habits that lead to data breaches. This article seeks to conduct a scoping review of the scholarly literature on Cyber Resilience for Development (Cyber4Dev) security culture within the context of ABLOT 发表于 2025-3-27 10:41:02
A Model for Information Security Culture with Innovation and Creativity as Enablersting the creativity and innovation of employees in an organisation can help to solve information security problems and to create a culture where information security issues are addressed and resolved, as opposed to being introduced by end-users. The study applied a theoretical approach with a scopinMusculoskeletal 发表于 2025-3-27 16:55:54
Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Linkslity to phishing in other media is well studied, the literature currently lacks studies on phishing susceptibility in MIM apps. This paper presents a study that offers the first insights into the susceptibility of users of MIM apps to phishing by investigating their behaviour towards shared links. UMULTI 发表于 2025-3-27 18:34:58
How Privacy Concerns Impact Swedish Citizens’ Willingness to Report Crimesdevices such as mobile phones from victims is a success factor that enables evidence-seeking through digital forensics. Unfortunately, forensic examinations of devices can become an additional negative consequence due to privacy invasion.Privacy invasion can make crime victims less cooperative and lendocardium 发表于 2025-3-27 22:33:05
erdatenblätter und Kernaussagen vermitteln einen schnellen Zugang zu den verschiedenen Akquisitionsmethoden und -instrumenten, die für moderne Bauunternehmen unerlässlich 978-3-528-11650-7978-3-322-80319-1凶兆 发表于 2025-3-28 02:15:11
Magdalena Glas,Manfred Vielberth,Tobias Reittinger,Fabian Böhm,Günther PernulKeratectomy 发表于 2025-3-28 08:07:06
Joakim Kävrestad,Martin Gellerstedt,Marcus Nohlberg,Jana RambuschSTAT 发表于 2025-3-28 13:05:49
Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Trainingpants were most willing to adopt and pay for contextual training, while eLearning was the second most favoured training type. We also measured if willingness to pay and adopt cybersecurity training was impacted by the participant’s worry about various cyber threats. Surprisingly, no meaningful corre