Byung-Jik Kim & Min-Jik Kim. (2024) The influence of work overload on cybersecurity behavior: A moderated mediation model of psychological contract breach, burnout, and self-efficacy in AI learning such as ChatGPT. Technology in Society 77, pages 102543.
Crossref
Robin L. Wakefield & Lane T. Wakefield. (2024) How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control. ACM SIGMIS Database: the DATABASE for Advances in Information Systems 55:1, pages 136-155.
Crossref
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty & Steven D'Alessandro. (2024) Human-centric cyber security: Applying protection motivation theory to analyse micro business owners’ security behaviours. Information & Computer Security.
Crossref
Ahmad Mtair Al-Hawamleh. (2024) Investigating the multifaceted dynamics of cybersecurity practices and their impact on the quality of e-government services: evidence from the KSA. Digital Policy, Regulation and Governance 26:3, pages 317-336.
Crossref
Tim Wright, Zainab Ruhwanya & Jacques Ophoff. (2024) Using the theory of interpersonal behaviour to explain employees’ cybercrime preventative behaviour during the pandemic. Information & Computer Security.
Crossref
Siqi Hu, Carol Hsu & Zhongyun Zhou. (2023) Understanding employees' perceptions of SETA events: the role of pedagogical and communication approaches. Internet Research 34:2, pages 294-319.
Crossref
Jef Naidoo, Ron Dulek, Seth Butler & Brooke Baily. (2024) Reporting a Cyber Security Breach: How Organizations Respond. International Journal of Business Communication.
Crossref
Iris van Ooijen, Claire M. Segijn & Suzanna J. Opree. (2022) Privacy Cynicism and its Role in Privacy Decision-Making. Communication Research 51:2, pages 146-177.
Crossref
Abdillah Abdillah, Ida Widianingsih, Rd Ahmad Buchari & Heru Nurasa. (2024) Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia. Array 21, pages 100336.
Crossref
Xusen Cheng, Ying Bao, Triparna de Vreede, Gert-Jan de Vreede & Junhan Gu. (2023) Ride-sharing customers’ self-protection motivation in the post-COVID-19 world. International Journal of Contemporary Hospitality Management 36:4, pages 1114-1142.
Crossref
Kate-Riin Kont. (2024) Management of cyber risks in the library: analysis of information security awareness of Estonian library employees. Library Management 45:1/2, pages 118-140.
Crossref
Crystal T. Lee, Zimo Li & Yung-Cheng Shen. (2024) Building bonds: an examination of relational bonding in continuous content contribution behaviors on metaverse-based non-fungible token platforms. Internet Research.
Crossref
Xiaolong Wang, Changlin Wang, Tianyu Yi & Wenli Li. (2024) Understanding the deterrence effect of punishment for marine information security policies non-compliance. Journal of Ocean Engineering and Science 9:1, pages 9-12.
Crossref
Adel Yazdanmehr, Muhammad Jawad, Raquel Benbunan-Fich & Jingguo Wang. (2024) The role of ethical climates in employee information security policy violations. Decision Support Systems 177, pages 114086.
Crossref
Emmanuel Awuni Kolog, Isaac Mensah & Sulemana Bankuoru Egala. (2024) Cyberloafing deterrence in the public sector of Ghana. THE ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES.
Crossref
Maryam Nasser AL-Nuaimi. (2022) Human and contextual factors influencing cyber-security in organizations, and implications for higher education institutions: a systematic review. Global Knowledge, Memory and Communication 73:1/2, pages 1-23.
Crossref
Malte Greulich, Sebastian Lins, Daniel Pienta, Jason Bennett Thatcher & Ali Sunyaev. (2024) Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking. Information Systems Research.
Crossref
Hsiang-Lan Cheng, Chiew Mei Tan, Chao-Min Chiu, Hsin-Yi Huang & Yi-Chien Lee. (2024) Using the ELM to Explore the Impact of Fake News on Panic Vaccination Intention. Journal of Global Information Management 32:1, pages 1-39.
Crossref
Heeyoung Choi, Sangun Park & Juyoung Kang. (2024) Enhancing Participatory Security Culture in Public Institutions: An Analysis of Organizational Employees’ Security Threat Recognition Processes. IEEE Access 12, pages 47543-47558.
Crossref
Karen Renaud, Merrill Warkentin, Ganna Pogrebna & Karl van der Schyff. (2024) VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Information & Management 61:1, pages 103877.
Crossref
Eun Hee Park, Jongwoo Kim, Young Soon Park & Kyung Hee Chun. (2024) Facilitating and impeding factors to insiders’ prosocial rule breaking in South Korea. Computers & Security 136, pages 103572.
Crossref
Samanta Mikuletič, Simon Vrhovec, Brigita Skela-Savič & Boštjan Žvanut. (2024) Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security 136, pages 103489.
Crossref
Chloe Sutcliffe, Ian Holman, Daniel Goodwin, Gloria Salmoral, Liwa Pardthaisong, Supattra Visessri, Chaiwat Ekkawatpanit & Dolores Rey. (2024) Which factors determine adaptation to drought amongst farmers in Northern Thailand? Investigating farmers’ appraisals of risk and adaptation and their exposure to drought information communications as determinants of their adaptive responses. Mitigation and Adaptation Strategies for Global Change 29:1.
Crossref
Areej Alyami, David Sammon, Karen Neville & Carolanne Mahony. (2023) The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model. Information Technology & People 36:8, pages 94-125.
Crossref
Nan (Peter) Liang, Rudy Hirschheim, Xin (Robert) Luo & Hayden Hollingsworth. (2023) Identifying the idiosyncrasies of behavioral information security discourse and proposing future research directions: A Foucauldian perspective. Journal of Information Technology 38:4, pages 382-415.
Crossref
Andreas Skalkos, Aggeliki Tsohou, Maria Karyda & Spyros Kokolakis. (2023) Exploring users’ attitude towards privacy-preserving search engines: a protection motivation theory approach. Information & Computer Security.
Crossref
Chul Woo Yoo, Inkyoung Hur & Jahyun Goo. (2023) Workgroup Collective Efficacy to Information Security Management: Manifestation of its Antecedents and Empirical Examination. Information Systems Frontiers 25:6, pages 2475-2491.
Crossref
Yavuz Idug, Suman Niranjan, Ila Manuj, David Gligor & Jeffrey Ogden. (2023) Do ride-hailing drivers' psychological behaviors influence operational performance?. International Journal of Operations & Production Management 43:12, pages 2055-2079.
Crossref
Hao Chen & Yufei Yuan. (2022) The impact of ignorance and bias on information security protection motivation: a case of e-waste handling. Internet Research 33:6, pages 2244-2275.
Crossref
W. Alec Cram & John D'Arcy. (2023) ‘What a waste of time’: An examination of cybersecurity legitimacy. Information Systems Journal 33:6, pages 1396-1422.
Crossref
Xuan Wang, Yaojie Li, Hanieh Javadi Khasraghi & Cherie Trumbach. (2023) The mediating role of security anxiety in internet threat avoidance behavior. Computers & Security 134, pages 103429.
Crossref
Ru Huang & Nan Liang. (2022) The influence of familiarity with Information Technology on the effects of deterrence. Current Psychology 42:33, pages 29712-29725.
Crossref
Kristian Kannelønning & Sokratis K. Katsikas. (2023) A systematic literature review of how cybersecurity-related behavior has been assessed. Information & Computer Security 31:4, pages 463-477.
Crossref
Olufunsho I. Falowo, Kehinde Koshoedo & Murat Ozer. (2023) An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review. An Assessment of Capabilities Required for Effective Cybersecurity Incident Management - A Systematic Literature Review.
Ya Yin, Carol Hsu & Zhongyun Zhou. (2023) Employees' in-role and extra-role information security behaviors from the P-E fit perspective. Computers & Security 133, pages 103390.
Crossref
Sebastian Hengstler, Stephan Kuehnel, Kristin Masuch, Ilja Nastjuk & Simon Trang. (2023) Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior. Computers & Security 133, pages 103370.
Crossref
Supunmali Ahangama. (2023) Relating Social Media Diffusion, Education Level and Cybersecurity Protection Mechanisms to E-Participation Initiatives: Insights from a Cross-Country Analysis. Information Systems Frontiers 25:5, pages 1695-1711.
Crossref
Jessica Parker. 2023. Applied Research Approaches to Technology, Healthcare, and Business. Applied Research Approaches to Technology, Healthcare, and Business
89
102
.
Trang Nguyen. (2023) Understanding Shadow IT usage intention: a view of the dual-factor model. Online Information Review.
Crossref
Muhammad Iskandar Hamzah. (2023) Fear of COVID-19 disease and QR-based mobile payment adoption: a protection motivation perspective. Journal of Financial Services Marketing.
Crossref
Cornelia Gerdenitsch, Daniela Wurhofer & Manfred Tscheligi. (2023) Working conditions and cybersecurity: Time pressure, autonomy and threat appraisal shaping employees’ security behavior. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 17:4.
Crossref
Shixuan Fu, Xiaojiang Zheng, Hongpeng Wang & Yunzhong Luo. (2023) Fear appeals and coping appeals for health product promotion: Impulsive purchasing or psychological distancing?. Journal of Retailing and Consumer Services 74, pages 103383.
Crossref
Eduardo D. Villacis Calderon, Tabitha L. James & Paul Benjamin Lowry. (2023) How Facebook's newsfeed algorithm shapes childhood vaccine hesitancy: An algorithmic fairness, accountability, and transparency (FAT) perspective. Data and Information Management 7:3, pages 100042.
Crossref
Saleh Yahya Alghamdi, Sumeet Kaur, Karishma M. Qureshi, Ali Saeed Almuflih, Naif Almakayeel, Saleh Alsulamy & Mohamed Rafik N. Qureshi. (2023) Antecedents for online food delivery platform leading to continuance usage intention via e-word-of-mouth review adoption. PLOS ONE 18:8, pages e0290247.
Crossref
Yuanxiang John Li & Elizabeth Hoffman. (2023) Designing an incentive mechanism for information security policy compliance: An experiment. Journal of Economic Behavior & Organization 212, pages 138-159.
Crossref
Sérgio Apolinário, Adilson Carlos Yoshikuni & Cláudio Luís Carvalho Larieira. (2023) Resistance to information security due to users’ information safety behaviors: Empirical research on the emerging markets. Computers in Human Behavior 145, pages 107772.
Crossref
Victoria Kisekka & Sanjay Goel. (2022) An Investigation of the Factors that Influence Job Performance During Extreme Events: The Role of Information Security Policies. Information Systems Frontiers 25:4, pages 1439-1458.
Crossref
Daeun Lee, Harjinder Singh Lallie & Nadine Michaelides. (2023) The impact of an employee’s psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. Cognition, Technology & Work 25:2-3, pages 273-289.
Crossref
Midori Inaba & Takeaki Terada. (2023) Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study. Nudge to Promote Employees' Information Security Compliance Behavior: A Field Study.
Ahmet Duzenci, Hakan Kitapci & Mehmet Sahin Gok. (2023) The Role of Decision-Making Styles in Shaping Cybersecurity Compliance Behavior. Applied Sciences 13:15, pages 8731.
Crossref
Bidyut Hazarika, Utkarsh Shrivastava, Vivek Kumar Singh & Alan Rea. (2023) Motivating mobile payment adoption during global pandemic: insights from protection motivation and theory of planned behavior. Global Knowledge, Memory and Communication.
Crossref
Ashraf Mady, Saurabh Gupta & Merrill Warkentin. (2023) The effects of knowledge mechanisms on employees' information security threat construal. Information Systems Journal 33:4, pages 790-841.
Crossref
Sultana Lubna Alam & Ruonan Sun. (2022)
The role of
system‐use
practices for sustaining motivation in crowdsourcing: A
technology‐in‐practice
perspective
. Information Systems Journal 33:4, pages 758-789.
Crossref
Ramulu Bhukya & Justin Paul. (2023) Social influence research in consumer behavior: What we learned and what we need to learn? – A hybrid systematic literature review. Journal of Business Research 162, pages 113870.
Crossref
Randi Jiang & Jianru Zhang. (2023) The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. Computers & Security 130, pages 103253.
Crossref
Berhanu Aebissa, Gurpreet Dhillon & Million Meshesha. (2023) The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks. Computers & Security 130, pages 103248.
Crossref
Qinfang Hu, Jing Hu & Zhilin Yang. (2022) Performance implications of peer monitoring among suppliers. Asia Pacific Journal of Marketing and Logistics 35:7, pages 1618-1638.
Crossref
Oluwaseun Enoch Akindele, Saheed Ajayi, Luqman Toriola-Coker, Adekunle Sabitu Oyegoke, Hafiz Alaka & Sambo Lyson Zulu. (2023) Sustainable construction practice in Nigeria: barriers and strategies for improvement. Built Environment Project and Asset Management 13:4, pages 590-609.
Crossref
Hsiu-Hua Cheng. (2023) Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety. Understanding Protection Motivation for Identity Theft in Information Security: An Extension of The Protection Motivation Theory with Anxiety.
Claire Seungeun Lee & Yi Ting Chua. (2023) The Role of Cybersecurity Knowledge and Awareness in Cybersecurity Intention and Behavior in the United States. Crime & Delinquency.
Crossref
Mansour Naser Alraja, Usman Javed Butt & Maysam Abbod. (2023) Information security policies compliance in a global setting: An employee's perspective. Computers & Security 129, pages 103208.
Crossref
Mohammed A. Al-Sharafi, Mostafa Al-Emran, Ibrahim Arpaci, Noorminshah A. Iahad, Adi Ahmad AlQudah, Mohammad Iranmanesh & Noor Al-Qaysi. (2023) Generation Z use of artificial intelligence products and its impact on environmental sustainability: A cross-cultural comparison. Computers in Human Behavior 143, pages 107708.
Crossref
Qingyu Zhang, Salman Khan, Safeer Ullah Khan & Ikram Ullah Khan. (2023) Assessing the older population acceptance of healthcare wearable in a developing Country: an extended PMT model. Journal of Data, Information and Management 5:1-2, pages 39-53.
Crossref
Eun Hee Park, Jongwoo Kim & Lynn Wiles. (2022) The role of collectivism and moderating effect of IT proficiency on intention to disclose protected health information. Information Technology and Management 24:2, pages 177-193.
Crossref
Frederik Ahlemann, Sven Dittes, Tim Fillbrunn, Kevin Rehring, Stefan Reining & Nils Urbach. (2022) Managing In-Company IT Standardization: A Design Theory. Information Systems Frontiers 25:3, pages 1161-1178.
Crossref
Zoran Mitrovic, Colin Thakur & Sudhika Palhad. (2023) Towards Building Cybersecurity Culture in TVET Colleges in South Africa. Towards Building Cybersecurity Culture in TVET Colleges in South Africa.
Ivan Fedorenko, Pierre Berthon & Linda Edelman. (2023) Top secret: Integrating 20 years of research on secrecy. Technovation 123, pages 102691.
Crossref
Wen-Lung Shiau, Xiaoqun Wang & Fei Zheng. (2023) What are the trend and core knowledge of information security? A citation and co-citation analysis. Information & Management 60:3, pages 103774.
Crossref
Luuk Bekkers, Susanne van 't Hoff-de Goede, Ellen Misana-ter Huurne, Ynze van Houten, Remco Spithoven & Eric Rutger Leukfeldt. (2023) Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model. Computers & Security 127, pages 103099.
Crossref
Qin An, Wilson Cheong Hin Hong, XiaoShu Xu, Yunfeng Zhang & Kimberly Kolletar-Zhu. (2022) How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates. International Journal of Information Security 22:2, pages 305-317.
Crossref
Tlou Maggie Masenya. 2023. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems. Handbook of Research on Cybersecurity Risk in Contemporary Business Systems
33
48
.
Ricardo R. Brooks, Kevin J. Williams & So-Yun Lee. (2023) Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation. Journal of Business and Psychology.
Crossref
A. J. Burns, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry & Bryan Fuller. (2023) Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. Information Systems Research 34:1, pages 342-362.
Crossref
Warut Khern-am-nuai, Matthew J. Hashim, Alain PinsonneaultWeining YangNinghui Li. (2023) Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments. Information Systems Research 34:1, pages 157-177.
Crossref
Yi Yong Lee, Chin Lay Gan & Tze Wei Liew. (2023) Thwarting Instant Messaging Phishing Attacks: The Role of Self-Efficacy and the Mediating Effect of Attitude towards Online Sharing of Personal Information. International Journal of Environmental Research and Public Health 20:4, pages 3514.
Crossref
John W. Traphagan & Kenneth W. Wisian. (2023) The W&T Realpolitik Scenario and Contact With Extraterrestrial Intelligence: A Reply to Wright et al.. Space Policy 63, pages 101536.
Crossref
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza & Mehwish Javed. (2023) Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. Computers & Security 125, pages 103049.
Crossref
Simon Vrhovec, Igor Bernik & Blaž Markelj. (2023) Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. Computers & Security 125, pages 103038.
Crossref
Sumesh J. Philip, Truong (Jack) Luu & Traci Carte. (2023) There's No place like home: Understanding users' intentions toward securing internet-of-things (IoT) smart home networks. Computers in Human Behavior 139, pages 107551.
Crossref
Trung Nguyen Quoc & Binh Nguyen Huu. 2023. Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022). Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022)
77
92
.
Trung Nguyen Quoc, Quyen Phan Thi Bao, Binh Nguyen Huu & An Nguyen Phuoc Bao. 2023. Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022). Proceedings of the International Conference on Emerging Challenges: Strategic Adaptation in the World of Uncertainties (ICECH 2022)
342
359
.
Maksym Vorokhob, Roman Kyrychok, Vladyslav Yaskevych, Yurii Dobryshyn & Serhii Sydorenko. (2023) MODERN PERSPECTIVES OF APPLYING THE CONCEPT OF ZERO TRUST IN BUILDING A CORPORATE INFORMATION SECURITY POLICY. Cybersecurity: Education, Science, Technique 1:21, pages 223-233.
Crossref
Michael Mncedisi Willie. (2023) The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture. SSRN Electronic Journal.
Crossref
Mohammed Bani Baker, Rami Sihwail & Manar Mizher. Integrating cyber security factors with TAM framework for implementation in the Jordanian banks. Integrating cyber security factors with TAM framework for implementation in the Jordanian banks.
Douglas Bosse, Steven Thompson & Peter Ekman. (2023) In consilium apparatus: Artificial intelligence, stakeholder reciprocity, and firm performance. Journal of Business Research 155, pages 113402.
Crossref
Mohammed Mubarkoot, Jörn Altmann, Morteza Rasti-Barzoki, Bernhard Egger & Hyejin Lee. (2023) Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review. Computers & Security 124, pages 102985.
Crossref
Obi Ogbanufe, Robert E. Crossler & David Biros. (2023) The valued coexistence of protection motivation and stewardship in information security behaviors. Computers & Security 124, pages 102960.
Crossref
Ignacio Fernandez De Arroyabe, Carlos F.A. Arranz, Marta F. Arroyabe & Juan Carlos Fernandez de Arroyabe. (2023) Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. Computers & Security 124, pages 102954.
Crossref
Ahmed AlKalbani, Hamed AlBusaidi & Hepu Deng. 2023. Intelligent Sustainable Systems. Intelligent Sustainable Systems
291
303
.
Morné de Bruyn & Tendani Thabela-Chimboza. 2023. South African Institute of Computer Scientists and Information Technologists. South African Institute of Computer Scientists and Information Technologists
117
135
.
Tim Wright, Zainab Ruhwanya & Jacques Ophoff. 2023. Human Aspects of Information Security and Assurance. Human Aspects of Information Security and Assurance
445
458
.
Ken Ditha Tania, Norris Syed Abdullah, Norasnita Ahmad & Samsuryadi Sahmin. 2023. Advances on Intelligent Computing and Data Science. Advances on Intelligent Computing and Data Science
639
648
.
Craig W. Gruber, Benjamin Trachik, Catherine Kirby, Sara Dalpe, Lila Silverstein, Siobhan Frey & Brendon W. Bluestein. 2023. Fostering Innovation in the Intelligence Community. Fostering Innovation in the Intelligence Community
1
17
.
Fredrik Karlsson, Karin Hedström & Ella Kolkowska. 2023. Cybersecurity Teaching in Higher Education. Cybersecurity Teaching in Higher Education
37
57
.
Humayun Zafar. (2022) Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting. International Journal of Systems and Software Security and Protection 13:1, pages 1-20.
Crossref
Dezhi Wu, Paul Benjamin Lowry, Dongsong Zhang & Youyou Tao. (2022) Patient Trust in Physicians Matters—Understanding the Role of a Mobile Patient Education System and Patient-Physician Communication in Improving Patient Adherence Behavior: Field Study. Journal of Medical Internet Research 24:12, pages e42941.
Crossref
Thomas F. Stafford. (2022) Platform-Dependent Computer Security Complacency: The Unrecognized Insider Threat. IEEE Transactions on Engineering Management 69:6, pages 3814-3825.
Crossref
John Loonam, Jeremy Zwiegelaar, Vikas Kumar & Charles Booth. (2022) Cyber-Resiliency for Digital Enterprises: A Strategic Leadership Perspective. IEEE Transactions on Engineering Management 69:6, pages 3757-3770.
Crossref
Murilo Catussi Almeida, Adilson Carlos Yoshikuni, Rajeev Dwivedi & Cláudio Luís Carvalho Larieira. (2022) Do Leadership Styles Influence Employee Information Systems Security Intention? A Study of the Banking Industry. Global Journal of Flexible Systems Management 23:4, pages 535-550.
Crossref
Wenqin Li, Rongmin Liu, Linhui Sun, Zigu Guo & Jie Gao. (2022) An Investigation of Employees’ Intention to Comply with Information Security System—A Mixed Approach Based on Regression Analysis and fsQCA. International Journal of Environmental Research and Public Health 19:23, pages 16038.
Crossref
Vikram S. Bhadauria & Anitha Chennamaneni. (2022) Do desire, anxiety and personal innovativeness impact the adoption of IoT devices?. Information & Computer Security 30:5, pages 730-750.
Crossref
Nidhi Singh, Richa Misra, Sonali Singh, Nripendra P. Rana & Sangeeta Khorana. (2022) Assessing the factors that influence the adoption of healthcare wearables by the older population using an extended PMT model. Technology in Society 71, pages 102126.
Crossref
Ranjan Pal, Peihan Liu, Taoan Lu & Ed Hua. (2023)
How Hard Is Cyber-risk Management in IT/OT Systems?
A Theory to Classify and Conquer Hardness of Insuring ICSs
. ACM Transactions on Cyber-Physical Systems 6:4, pages 1-31.
Crossref
Abubakar Bello & Queen Aigbefo. 2022. Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications. Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications
243
265
.