“…Preventive behaviors mitigate risks before an incident occurs, reactive behaviors respond to an incident after it occurs, and adaptive behaviors involve changing practices based on past incidents or new information about potential threats [35]. In the individual context, cybersecurity behavior involves actions such as creating and managing strong passwords, avoiding suspicious emails or websites, regularly updating and patching software, using secure networks, and backing up data [36]. Research has shown that these behaviors are influenced by a range of factors, including individuals' knowledge, attitudes, and perceptions of threat and vulnerability as well as organizational culture, policies, and training [24][25][26][27]37].…”