2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC) 2016
DOI: 10.1109/compsac.2016.52
|View full text |Cite
|
Sign up to set email alerts
|

An Augmented Cybersecurity Behavioral Research Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The confidentiality aspect of security is a basic privacy goal, and is concerned with the prevention of unauthorised access to sensitive data (Schneier, 2011). Because personal data is a common factor underlying the constructs of both security and privacy (Pearson, 2013), we have theorised that personal data, and how it is perceived by individuals, influences security related behaviour (Addae et al, 2016). APD here refers to the value people place on their data, and their tendency to adopt measures to protect it.…”
Section: Attitude To Personal Data (Apd)mentioning
confidence: 99%
“…The confidentiality aspect of security is a basic privacy goal, and is concerned with the prevention of unauthorised access to sensitive data (Schneier, 2011). Because personal data is a common factor underlying the constructs of both security and privacy (Pearson, 2013), we have theorised that personal data, and how it is perceived by individuals, influences security related behaviour (Addae et al, 2016). APD here refers to the value people place on their data, and their tendency to adopt measures to protect it.…”
Section: Attitude To Personal Data (Apd)mentioning
confidence: 99%
“…Prior research in adversarial and behavioral cybersecurity experimented with deception techniques by introducing honeypots systems in the network (Furman et al, 2012 ; Addae et al, 2016 ; Caulkins et al, 2016 ). Researchers experimented with the effect of subnetting a network during a cyber-attack (Achleitner et al, 2017 ; Kelly et al, 2019 ).…”
Section: Discussionmentioning
confidence: 99%
“…Prior research in adversarial and behavioral cybersecurity experimented with deception techniques by introducing honeypots systems in the network (Furman et al, 2012;Addae et al, 2016;…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In their study on cybersecurity implementation and adoption, Tan et al (2021) examined the impact of the technology acceptance model on the acceptance of the cybersecurity maturity model in organizations. Addae et al (2016) proposed a behavioral cybersecurity model based on behavioral theories to identify factors affecting the individuals' cybersecurity behavior. Kumar et al (2021) used the human‐organization‐technology (HOT) theory as a means by which to identify the drivers required to enrich cybersecurity at the organizational level.…”
Section: Research Model and Hypotheses Developmentmentioning
confidence: 99%