Citations (10)
Keep up to date with the latest research on this topic with citation updates for this article.
Read on this site (2)
Lies De Kimpe, Michel Walrave, Pieter Verdegem & Koen Ponnet. (2022) What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime context. Behaviour & Information Technology 41:8, pages 1796-1808.
Read now
Read now
Queen A. Aigbefo, Yvette Blount & Mauricio Marrone. (2022) The influence of hardiness and habit on security behaviour intention. Behaviour & Information Technology 41:6, pages 1151-1170.
Read now
Read now
Articles from other publishers (8)
Uzma Noor, Mahnaz Mansoor & Amjad Shamim. (2022) Customers create customers!–Assessing the role of perceived personalization, online advertising engagement and online users' modes in generating positive e-WOM. Asia-Pacific Journal of Business Administration 16:2, pages 392-409.
Crossref
Crossref
Sigi Goode & Amir Riaz. (2023) Comparing security perceptions and relationship configurations of mobile device modders and non-modders. Information Technology & People.
Crossref
Crossref
Fabian Teichmann, Sonia R. Boticiu & Bruno S. Sergi. (2023) The evolution of ransomware attacks in light of recent cyber threats. How can geopolitical conflicts influence the cyber climate?. International Cybersecurity Law Review 4:3, pages 259-280.
Crossref
Crossref
Alexis D. Souchet, Domitile Lourdeaux, Jean-Marie Burkhardt & Peter A. Hancock. (2023) Design guidelines for limiting and eliminating virtual reality-induced symptoms and effects at work: a comprehensive, factor-oriented review. Frontiers in Psychology 14.
Crossref
Crossref
Xuping Huang, Shunsuke MochizukiAkira Fujita & Katsunari Yoshioka. (2023) Simulating and Estimating the Effectiveness of Security Notification by ISP to Malware-Infected Users. Journal of Information Processing 31:0, pages 165-173.
Crossref
Crossref
Cho Do Xuan & DT Huong. (2022) A new approach for APT malware detection based on deep graph network for endpoint systems. Applied Intelligence 52:12, pages 14005-14024.
Crossref
Crossref
Cho Do Xuan, DT Huong & Duc Duong. (2022) New approach for APT malware detection on the workstation based on process profile. Journal of Intelligent & Fuzzy Systems 43:4, pages 4815-4834.
Crossref
Crossref
Cho Do Xuan, D.T. Huong & Toan Nguyen. (2022) A novel intelligent cognitive computing-based APT malware detection for Endpoint systems. Journal of Intelligent & Fuzzy Systems 43:3, pages 3527-3547.
Crossref
Crossref