Insubordinate 发表于 2025-3-27 00:56:14

http://reply.papertrans.cn/43/4290/428969/428969_31.png

Anticonvulsants 发表于 2025-3-27 03:04:08

http://reply.papertrans.cn/43/4290/428969/428969_32.png

根除 发表于 2025-3-27 05:44:54

Cyber4Dev Security Culture Model for African Countriesstrong information security culture within organizations will assist in reducing the effects of human habits that lead to data breaches. This article seeks to conduct a scoping review of the scholarly literature on Cyber Resilience for Development (Cyber4Dev) security culture within the context of A

BLOT 发表于 2025-3-27 10:41:02

A Model for Information Security Culture with Innovation and Creativity as Enablersting the creativity and innovation of employees in an organisation can help to solve information security problems and to create a culture where information security issues are addressed and resolved, as opposed to being introduced by end-users. The study applied a theoretical approach with a scopin

Musculoskeletal 发表于 2025-3-27 16:55:54

Understanding Phishing in Mobile Instant Messaging: A Study into User Behaviour Toward Shared Linkslity to phishing in other media is well studied, the literature currently lacks studies on phishing susceptibility in MIM apps. This paper presents a study that offers the first insights into the susceptibility of users of MIM apps to phishing by investigating their behaviour towards shared links. U

MULTI 发表于 2025-3-27 18:34:58

How Privacy Concerns Impact Swedish Citizens’ Willingness to Report Crimesdevices such as mobile phones from victims is a success factor that enables evidence-seeking through digital forensics. Unfortunately, forensic examinations of devices can become an additional negative consequence due to privacy invasion.Privacy invasion can make crime victims less cooperative and l

endocardium 发表于 2025-3-27 22:33:05

erdatenblätter und Kernaussagen vermitteln einen schnellen Zugang zu den verschiedenen Akquisitionsmethoden und -instrumenten, die für moderne Bauunternehmen unerlässlich 978-3-528-11650-7978-3-322-80319-1

凶兆 发表于 2025-3-28 02:15:11

Magdalena Glas,Manfred Vielberth,Tobias Reittinger,Fabian Böhm,Günther Pernul

Keratectomy 发表于 2025-3-28 08:07:06

Joakim Kävrestad,Martin Gellerstedt,Marcus Nohlberg,Jana Rambusch

STAT 发表于 2025-3-28 13:05:49

Survey of Users’ Willingness to Adopt and Pay for Cybersecurity Trainingpants were most willing to adopt and pay for contextual training, while eLearning was the second most favoured training type. We also measured if willingness to pay and adopt cybersecurity training was impacted by the participant’s worry about various cyber threats. Surprisingly, no meaningful corre
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Human Aspects of Information Security and Assurance; 16th IFIP WG 11.12 I Nathan Clarke,Steven Furnell Conference proceedings 2022 IFIP Int