Cyber Security Laws and Regulations

Verified

Added on  2022/12/15

|15
|5469
|290
AI Summary
This article discusses the challenges and vulnerabilities in mobile security, such as malware delivery, data leakage, and mobile botnets. It also explores the past, current, and future trends in mobile security, including the evolution of mobile technology and the implications for businesses. Additionally, it examines the importance of legal and legislative considerations in ensuring mobile security.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber security laws and regulations

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber security laws and regulations 1
Topic
The explosion of sophisticated mobile phones and IoT devices continues. There are several
countries which are slanting towards mobile broadband adoption than the fixed. Such
adoption, in turn, has reproduced new attack methods along with the increased frequency of
the attacks. There are some common attack methods identified in the case of mobile security.
The various methods for malware delivery and another security hazard to mobile devices like
phishing. The other challenge to be encountered in mobile security is data leakage (Kent,
2016). It usually occurs when operators give extensive permissions to apps and services
without even comprehending the consequences. Mainly these tend to be free apps and goes
beyond the advertised features and functionality by referring information to the inaccessible
servers. Another disadvantage faced by the operators is when they attempt to root their device
management solutions, therefore devices are exposed to the attacks. There are also some
other vulnerabilities of mobile devices like unsecured WiFi, malware in app stores and
mobile botnets. The users commonly ask for the WiFi hotspots to connect in several
situations (Knowles, et al. 2015). Such WiFi is commonly insecure and can be used to
compromise connected mobile device operators. On the other side, network deceiving is used
to fix up phoney access points in order to imitate authentic public locations at the high traffic
locations such as airports and coffee shops. It also encourages operators to create an account
or log in with the prospective harmful consequences. For instance, the key reinstallation
attacks like KRACKS leverages vulnerabilities in the WiFi networks to snip penetrating
information comprising login credentials and files. The exploits like Broadpwn targets
susceptibilities in the Broadband chipsets enables attackers to hack into mobile phones
(Iannacone, et al. 2015).
The major threat in the mobile security links to the upsurge of trojanised applications on app
marketplaces. The malware can be conceded in the apps marketed as open source, music
player, free and file explorer applications. A malware is discovered y McAfee known as
Grabos. It is a version which is found in a number of applications. It has been designed to
mislead the victim into download subsequently they prompt to install more apps. Geabos was
capable of avoiding the security tools by updating the setting in every twenty-four hours. The
mobile botnets are the other mobile device vulnerability (Liu, et al. 2018). These botnets on
the mobile device ensue to contaminate applications which are already installed. In an
instance taken place in August 2017, WireX embattled susceptible expedients by
Document Page
Cyber security laws and regulations 2
contaminating them and forming a botnet which created DDoS outbreaks. It was more of
alike attacks to Mirai but emphasis on mobile devices (Hendrix, Al-Sherbaz and Victoria,
2016).
An evolutionary view of the past, current and future trend
Empowering mobility is considered more than giving employees smartphones. The mobility
is not identified as the one size which fits all. A few employees spend most of the time at the
desks whereas others hardly set foot in the office. On the other side, some employees mix it
up as requisite. In the past, there were fewer options for mobile security. The smartphone
users were also more exposed to several threats when the phone was used. The mobile threats
were growing on the constant speed. It used to interrupt the mobile phone operations or
modify the data (Benson, McAlaney and Frumkin, 2019). The mobile security in the past
developed at a slow rate, voice recognition, biometrics, Bluetooth, augmented reality and
home automation is some of the examples. Limited to Google and Siri, voice recognition has
capabilities have represented a huge development with Apple’s Speech recognition API. It
gave mobile apps voice recognition and voice instant functionality. The voice functions were
added to the extraordinary value of mobile applications. Most of the smartphones in the past
included fingerprint scanning and iris scanning. The biometric capabilities on the mobile
build personal identification for secure payments, secure file, and server authentication
(Maglaras, et al. 2018). The advancement with the Bluetooth low energy was seen in the past.
It even brought loner ranges, higher speed and less power consumption to the mobile
ecosystem. The Bluetooth audio also enabled mobile apps to control home, cars, drones, and
more external devices. The augmented reality was used to enhance brand awareness and
educate users regarding products and store locations. The Home kit was also invented to
discover devices, connect and control without even writing big codes. It even enabled
activity-based control (Ben-Asher and Gonzalez, 2015).
At present a successful mobile-first strategy enables employees to choose the way they want
to work and accommodate their wants. For instance, some employees who want to use trusted
devices where as others like to keep the business and personal lives distinct. The employees
are given positive and user-friendly experience across all the devices as it enhances
productivity at all the levels of the company. There are many companies which use mobile
Document Page
Cyber security laws and regulations 3
device management (MDM) tools in order to promote mobility by keeping the devices
secure. Such tools help in provisioning and tracking corporate owned devices (Gordon, et al.
2015). A person can even lock and wipe the device if it gets lost or stolen. MDM safeguards
the actual device and does not safeguard the data stored in remote servers or cloud. It even
generates challenges if individuals access information from their mobile devices. The
businesses are even disabling the challenges caused by MDM by moving to enterprise
mobility management (EMM). It enables all the features of MDM along with the tools
increasing mobility and data security. On the other side, trends prevailing at present like
mobile application management which not only protects the device but secures the
applications run on the devices. EMM secures area known as a container on each device of
the employees (Pacheco and Hariri, 2016). An individual can drop all the corporate apps
required in the container. This container is separate from the personal apps of the employees.
So the employees do not need to concern about the boss or IT department who is evaluating
their personal data. EMM even make provisioning employee-owned devices easy. When a
new employee turns on smart phone or tablet, he will have instant access to all of the
productivity apps. The employees do not have any need to install anything or make changes
in the settings (Bridges, et al. 2015). The employees who are leaving the organization and
keeping their personal device then their container are simply wiped in order to remove access
to any of the business applications. The mobile application management even reduces
employee data usage. When the employees are assigned with the corporate-owned devices
then the company can control the applications employees can and cannot use. For instance,
the employees can be given with Office 365 but can block Netflix. It can keep the cost down
and assist in better managing the wireless budget. Add on mobile content management
secures the application by enabling the authorized people to view it. An individual can even
secure the content by moving between corporate and personal mobile devices. The mobile
content management enables companies to monitor when employees open and distributes
corporate files (Baig, et al. 2017).
The mobile industry has seen a boom in the way customers are adopting mobile technology
to stay associated. As the new technologies and innovations are becoming advance, the
requirement for security is also becoming more acute. As technology is evolving, the past and
current methods of security become less effective. The future of the mobile security calls for
the forward thinking so that creatively designed attacks on the companies and financial
institutions can be combatted. The technologies like IoT, artificial intelligence and business

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber security laws and regulations 4
intelligence are slowly developing and influencing the way business is conducted (Buczak
and Guven, 2015). All of these technologies give rise to the great opportunities for the
expansion but also has advanced the backgrounds in which hackers operate. There are several
cyber-attacks which are seen in the past years like NHS and CIA. The mobile application
security is deeply connected with the innovations for the safeguard future of cyber security.
The introduction and adoption of the technologies in the future can only empower the
businesses (Sabaliauskaite and Mathur, 2015). As the internet is becoming significant, it is
also becoming essential to address security. The innovations in technology are enabling
businesses to condense headcount and automate several decisions. An increase in the number
of decisions will be automated. In the future, businesses will continue to emerge cyber-attack
technologies for safeguard and offense and the criminal groups will continue to pursue ways
to monetize the cyber-attacks. The cyber-attacks will continue but it is suggested to stay on
the ground. The cyber security defense systems are required to become more sophisticated in
the future to cope with the huge amount of data. Firstly, defense systems should be
interconnected to act in real life. More reliance should be on artificial intelligence to assist in
decision making. The trends will continue in the future like artificial intelligence, location-
based technology, augmented reality and syncing wearable technology with mobile devices
(Atat, et al. 2017).
The implication of the trend to the world
The growth of mobile technology has transformed the world. It presents substantial
opportunities and advantages for individuals and business organizations. The opportunities
available spread out to the people considering using such recompenses for the crime as well.
As the number of mobile devices is increasing every year, the apprehension of mobile
security is becoming more serious. The mobile security is about the defense of movable
devices like smartphones, laptops, smart watches and tablets from the threats and
susceptibilities (Carr, 2016). It is the top priority to manage the mobile device risks for
security pros. The employees at the workplace do not just bring mobile devices but they live
for them. Checking phone for many employees is the first and last thing to do in routine. It
has been observed that 74% of the individuals check their mobile phones within fifteen
minutes of going to sleep whereas 61% ensure to check it again within five minutes of getting
up. Almost 88% of the individuals reported looking at the mobile phones within thirty
minutes of waking up. As smartphones have become persistent companions, the hackers have
Document Page
Cyber security laws and regulations 5
started to pursue every opportunity accessible to break into them. Several people anticipate
that iPhone or Android devices are safe by default but in authenticity, it is up to the operator
to make safety configuration changes. The hackers are capable of gaining entree to nearby
mobile devices in less than thirty seconds with the use of the right equipment. They can even
mirror the device and view everything. The malware can also be installed by them which
enable to siphon data at their leisure (Anwar, et al. 2017).
The kinds of cyber-attacks worldwide are progressing speedily and smartphones have
become a precarious part of the cyber security efforts with a good reason. It has been
revealed that 27% of the corporate traffic data flow straight from mobile devices to the cloud.
The cloud services deliberate a substantial obstacle to the active breach response. The trends
like mobile security put an effect on the world in the form of corporeal access, malicious
code, communication intervention, device attacks, and insider attacks. The smartphones are
easily portable and are lighter in the weight. The diminutive size of the mobiles makes them
ideal for travel companions (Colbert and Kott, 2016).
The mobile security has become more important due to increasing concern of the security of
both personal and business data stowed on smart phones. Nowadays, more and more
operators and organizations are making use of smartphones to communicate. It helps in
organizing and planning work. The technologies within the organizations are causing changes
to the information systems and have resulted in the new risks (Schoitsch, Schmittner Ma and
Gruber, 2016). The smartphones gather and accumulate a growing amount of complex
information to which entree is required to be precise in order to defend the confidentiality of
the users worldwide. The way mobile devices purpose; incline to have inimitable
susceptibilities when it is equated to the desktops and servers with attack vectors, erected in
defenses and threats. It has been realized that the physical size of the mobile devices gives
access to unique portability. The size of the mobile devices is small which makes it more
vulnerable to being stolen, lost or momentarily misplaced (Almeshekah and Spafford, 2016).
Once the mobile devices go out of the official user’s hand, the credential, personal and
corporate data stored on the device and gate applications become more vulnerable to the risk.
In accumulation, the tiny displays and keyboards of the mobile devices generally force
creators to make safety trade-offs for obliging an improved mobile user practice. The mobile
devices are being connected over a number of networks to receive, access or communicate
data let it be delicate or otherwise. Networks comprising 3G, 4G, GSM, Bluetooth, 802.11
grounded wireless networks, SMS and MMS texts. Each connection has its own safety,
Document Page
Cyber security laws and regulations 6
strength, and confines and is a path for remoting feats comprising data seepage or
interruption by malicious operators. This situation happens mainly when the mobile user is
not aware of the threats or vulnerabilities (Cavelty and Balzacq, 2016).
The mobile data also leads to data security and privacy concerns worldwide. The mobile
applications can take benefit of the capabilities like accurate and continuous device location
information, personal health metrics, photos and audios of the user. The data collected and
stored generally conveyed by the mobile applications which raise the concern of
confidentiality and security if the data gets unprotected through the claims to the prohibited
users. The mobile applications are even executed in several of the same languages as desktop
and web counterparts. It becomes prone to various attacks and susceptibilities linked with the
languages comprising infection and compromise by the malicious software (Shin, Son, and
Heo, 2015). Trojan, spyware, worms, horse programs, and computer viruses are some of the
vulnerabilities along with phishing and other social engineering tactics. The technology takes
place with some risks and threats with the mobile stage. It is quite possible for the businesses
to alleviate the possible risks at the time of the development of the mobile applications
through the security policies, standards, education, training, and the security engineering
activities (Cherdantseva, et al. 2016).
Application of the legal and legislative considerations linking to the trend
The controversial laws have been passed by Australia to induce technology companies to
grant police and security assistances. This law requires sources to hand over an accused’s
communication to the police. It makes possible for the service provider to use a form of
encryption which enables them to Implication view the operator’s message. In current years,
an extra level of security has been added to the services like Whatsapp, Signal and more. This
layer is identified as an end to end encryption. It enables only sender and recipient to sight the
message and prevent from being decrypted by the service provider (Collins, 2016). Australia
and some other nations have confirmed that criminals and terrorists feat such technology to
evade the investigation. The Australian legislation has even forced organizations to form a
technological function which gives admission to the encoded messages without even the
knowledge of the user. It even safeguards that the national safety and law enforcement
agencies are equipped with the required recent tools along with the apposite authority. A new

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security laws and regulations 7
law in the country is providing law enforcement establishments a power to force tech-
industry giants such as Apple to produce gears which can evade the encryption construct into
their products. This law is Telecommunications and Other Legislation Amendment or
Assistance and Access Bill, 2018 and is now an act. It creates changes in more than a dozen
of the legislation as a power to battle what government raises to the descriptive memorandum
(Dalal and Gorab, 2016). The legislation induces private companies to generate new
interception capabilities, therefore, no communications data is wholly inaccessible to the
government. This security vulnerability is arrayed in secret without even public knowledge.
This legislation is definitely problematic in a number of ways, but the Australian Senate has
rushed the bill amidst the political games and sniping. The nation’s prime opposition party
ultimately relented into supporting the bill. The issue has been also raised from forcing
companies to entrench some kind of backdoor access to the encrypted data which has mainly
weakened the security for everyone. It is not clear that what will be bill asking the technology
companies as an inclusive end to end encryption is an essentially undeniable process. Once
the encryption is enabled in the apps like WhatsApp the companies will have no way to
access the data. It is legally obliged to generate something under the parameters which allows
companies to intercept a message (DiMase, et al. 2015).
The laws necessitating device constructors and software inventers have assisted law
enforcement assistances to bang encryption. It could have dreadful significances for the
country and for the phone operators and security experts. As per the experts, end to end
security of the individual apps like WhatsApp and Signal can be quite good for the
encryption to be cracked. The encryption busting law necessitates all the tech businesses to
hand over the user data which is used to construct a backdoor into their encryption
(Abomhara, 2015). This decision has even huge insinuations for the communication
companies not just in Australia but all over the world. The legislation induces companies not
only to hand over the data they have access to but also to construct the ability to intercept the
data. Creation of a backdoor has security implications globally just because hackers might be
able to take advantage of the deteriorated security. The legislation has even raised concern
over the companies opposing in the international market. The modifications cannot be
disclosed to the customers which are breeding distrust of the Australian products in the
worldwide market. Add on, the idea of government’s convincing a private company to
secretly install backdoor access into the private communications sound familiar. It has
recently devastated the global reputation of the Chinese manufacturer Huawei. Australia has
Document Page
Cyber security laws and regulations 8
attained the best position for pushing through the bill demanding tech companies to insert
backdoor access into the encrypted information (Fielder, et al. 2016).
Prediction
The businesses will be assisting employees by making use of personal or work devices
tenuously. There are some innovations which are yet to happen in the future for mobile
security. There are talks in the news regarding smartphone vulnerabilities and mobile
securities. There are no crystal balls which represent accuracy but it is tough to make
predictions specifically about the future. Still, a contrarian prediction has been made which
deliberates that there are going to be more of spectacular data breaches in the coming years.
The artificial intelligence and machine learning as double edge sword will assist to both
attackers and defenders (Shoemaker, Davidson, and Conklin, 2017). The data has generated
an explosion of the opportunities for the businesses whereas the ability to collaborate on the
sensitive data and take full advantage of the artificial intelligence opportunities. It helps in
generating insights and is currently inhibited by the compliance, privacy risks, and the
regulatory controls. The security challenge of the ‘data in use’ will be overcome by
implementing the universal truth of all time mathematics. It enables data collaboration
without even the requirement of trust. For instance, zero-knowledge proof enables of the
claim without even revealing any information afar what is claimed (Stevens, 2016).
The IT in the future not going to be just about safeguarding complex data and keeping
activists out of the systems. In this age of big data and artificial intelligence (AI), the
cooperation on the data can create huge business prospects along with the systematic and
curative breakouts. The security is even going to emphasis on permitting organizations to
leverage and cooperate without even being exposed to privacy. The mobile security is
possible by doing certain activities like protecting the screen with the password (Sun, Hahn,
and Liu, 2018). It has been realized that 30% of the people do not protect their device with
the password. It is an easy way to protect mobile devices with just a password. The mobile
devices can be locked by pattern lock and PIN number code. It can really boost mobile
security by choosing complex passwords. Locking sim card is another way to look out in the
future. The screen lock is obliging but it cannot prevent from eradicating the sim card and
expending it in another phone. It is a good recommendation to set up a sim card lock in the
form of a PIN number (Van Schaik, et al. 2017). This PIN number will be required to be
entered at the time of turning the phone on in order to enable network connection. It
Document Page
Cyber security laws and regulations 9
guarantees if the phone is stolen then it will be of slight or no custom of the thief. The anti-
virus applications can even be installed for protecting the security of mobile devices. Such
programs can scan the operating system, identify the risk and remove. Such apps seamlessly
are run in the background on the pre-set schedule and the users can be assured that their
devices are reliably protected. Add on, there are also several anti-virus software applications
which are mainly designed to keep phone running faster (Whitty, et al. 2015). Security apps
can also be installed to address security issues. The security apps are an excellent and
effective choice. The apps like avast anti-theft, Cerberus, find my iPhone is the security apps
which allows GPS tracking to reveal the specific location of the lost phone. It also allows
locking smart phone in case it is misplaced. The attention should also be paid to the
applications asking for access. It can have an enormous impact on mobile security. It is
extremely important to be conscious when it comes to downloading apps and the kind of
information accessed. The simple way to prevent any data intrusion from any app is to pay
attention at the time of downloading the app and access several features on the mobile.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber security laws and regulations 10
References
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Almeshekah, M.H. and Spafford, E.H., 2016. Cyber security deception. In Cyber
deception (pp. 23-50). Springer, Cham.
Anwar, M., He, W., Ash, I., Yuan, X., Li, L. and Xu, L., 2017. Gender difference and
employees' cybersecurity behaviors. Computers in Human Behavior, 69, pp.437-443.
Atat, R., Liu, L., Chen, H., Wu, J., Li, H. and Yi, Y., 2017. Enabling cyber-physical
communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-
security. IET Cyber-Physical Systems: Theory & Applications, 2(1), pp.49-54.
Baig, Z.A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., Johnstone, M.,
Kerai, P., Ibrahim, A., Sansurooah, K. and Syed, N., 2017. Future challenges for smart cities:
Cyber-security and digital forensics. Digital Investigation, 22, pp.3-13.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, pp.51-61.
Benson, V., McAlaney, J. and Frumkin, L.A., 2019. Emerging Threats for the Human
Element and Countermeasures in Current Cyber Security Landscape. In Cyber Law, Privacy,
and Security: Concepts, Methodologies, Tools, and Applications (pp. 1264-1269). IGI
Global.
Bridges, S.M., Keiser, K., Sissom, N. and Graves, S.J., 2015, April. Cyber security for
additive manufacturing. In Proceedings of the 10th Annual Cyber and Information Security
Research Conference (p. 14). ACM.
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
pp.1153-1176.
Carr, M., 2016. Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), pp.43-62.
Document Page
Cyber security laws and regulations 11
Cavelty, M.D. and Balzacq, T. eds., 2016. Routledge handbook of security studies.
Routledge.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K.,
2016. A review of cyber security risk assessment methods for SCADA systems. Computers
& security, 56, pp.1-27.
Colbert, E.J. and Kott, A. eds., 2016. Cyber-security of SCADA and other industrial control
systems (Vol. 66). Springer.
Collins, A. ed., 2016. Contemporary security studies. Oxford university press.
Dalal, R.S. and Gorab, A.K., 2016. Insider threat in cyber security: what the organizational
psychology literature on counterproductive work behavior can and cannot (yet) tell us.
In Psychosocial Dynamics of Cyber Security (pp. 122-140). Routledge.
DiMase, D., Collier, Z.A., Heffner, K. and Linkov, I., 2015. Systems engineering framework
for cyber physical security and resilience. Environment Systems and Decisions, 35(2),
pp.291-300.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2015. Externalities and the
magnitude of cyber security underinvestment by private sector firms: a modification of the
Gordon-Loeb model. Journal of Information Security, 6(1), p.24.
Hendrix, M., Al-Sherbaz, A. and Victoria, B., 2016. Game based cyber security training: are
serious games suitable for cyber security training?. International Journal of Serious
Games, 3(1), pp.53-61.
Iannacone, M.D., Bohn, S., Nakamura, G., Gerth, J., Huffer, K.M., Bridges, R.A., Ferragut,
E.M. and Goodall, J.R., 2015. Developing an Ontology for Cyber Security Knowledge
Graphs. CISR, 15, p.12.
Kent, A.D., 2016. Cyber security data sources for dynamic network research. In Dynamic
Networks and Cyber-Security(pp. 37-65).
Document Page
Cyber security laws and regulations 12
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Liu, X., Dong, M., Ota, K., Yang, L.T. and Liu, A., 2018. Trace malicious source to
guarantee cyber security for mass monitor critical infrastructure. Journal of Computer and
System Sciences, 98, pp.1-26.
Maglaras, L.A., Kim, K.H., Janicke, H., Ferrag, M.A., Rallis, S., Fragkou, P., Maglaras, A.
and Cruz, T.J., 2018. Cyber security of critical infrastructures. ICT Express, 4(1), pp.42-45.
Pacheco, J. and Hariri, S., 2016, September. IoT security framework for smart cyber
infrastructures. In 2016 IEEE 1st International Workshops on Foundations and Applications
of Self* Systems (FAS* W) (pp. 242-247). IEEE.
Sabaliauskaite, G. and Mathur, A.P., 2015. Aligning cyber-physical system safety and
security. In Complex Systems Design & Management Asia (pp. 41-53). Springer, Cham.
Schoitsch, E., Schmittner, C., Ma, Z. and Gruber, T., 2016. The need for safety and cyber-
security co-engineering and standardization for highly automated automotive vehicles.
In Advanced Microsystems for Automotive Applications 2015(pp. 251-261). Springer, Cham.
Shin, J., Son, H. and Heo, G., 2015. Development of a cyber security risk model using
Bayesian networks. Reliability Engineering & System Safety, 134, pp.208-217.
Shoemaker, D., Davidson, D. and Conklin, A., 2017. Toward a Discipline of Cyber Security:
Some Parallels with the Development of Software Engineering Education. EDPACS, 56(5-6),
pp.12-20.
Stevens, T., 2016. Cyber security and the politics of time. Cambridge University Press.
Sun, C.C., Hahn, A. and Liu, C.C., 2018. Cyber security of a power grid: State-of-the-
art. International Journal of Electrical Power & Energy Systems, 99, pp.45-56.
Van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk
perceptions of cyber-security and precautionary behaviour. Computers in Human
Behavior, 75, pp.547-559.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security laws and regulations 13
Whitty, M., Doodson, J., Creese, S. and Hodges, D., 2015. Individual differences in cyber
security behaviors: an examination of who is sharing passwords. Cyberpsychology, Behavior,
and Social Networking, 18(1), pp.3-7.
Document Page
Cyber security laws and regulations 14
References
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]