Deakin University: A Detailed Literature Review of Cybersecurity
VerifiedAdded on 2023/06/04
|11
|2828
|400
Literature Review
AI Summary
This literature review examines cybersecurity awareness campaigns, focusing on home and general users, their behaviors, and limitations. It explores various techniques, including differential privacy, pseudonym exchange, and cryptography, used in preserving privacy within social networks. The review covers research on privacy in publishing social graphs, activities, multimedia sharing, cyber-physical social systems, and mobile social networks. It evaluates security measures against advanced persistent threats and discusses the impact of factors on cyber network security. The review concludes by addressing challenges in security evaluation and proposes defense strategies to enhance network security. Desklib offers similar solved assignments and past papers for students.

Running head: CYBER SECURITY AWARENESS CAMPAIGN
CYBER SECURITY AWARENESS CAMPAIGN
Name of the Student
Name of the University
Author Note:
CYBER SECURITY AWARENESS CAMPAIGN
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CYBER SECURITY AWARENESS CAMPAIGN
Table of Contents
Introduction..........................................................................................................................2
Literature review..................................................................................................................2
Home users......................................................................................................................2
Limitation........................................................................................................................4
General users...................................................................................................................4
Limitation........................................................................................................................6
Conclusion...........................................................................................................................7
References............................................................................................................................8
Table of Contents
Introduction..........................................................................................................................2
Literature review..................................................................................................................2
Home users......................................................................................................................2
Limitation........................................................................................................................4
General users...................................................................................................................4
Limitation........................................................................................................................6
Conclusion...........................................................................................................................7
References............................................................................................................................8

2CYBER SECURITY AWARENESS CAMPAIGN
Introduction
Cyberspace is considered to be an integrated part of the society as important data is being
transferred day and night (Bada and Sasse, 2014). Cyberspace is needed for vulnerability which
is needed for wide range of threats. Cyber perpetrators on certain number of techniques which is
needed for political and military goals (Abawajy 2014). In the domain of information technology
risk and consequence of cyber-attacks helps in improving the security in cyberspace. Advanced
persistence threats (APT) are considered to be new types of emerging threats of cyber-attack
(Kortjan and Von Solms, 2014). With the help of clear goal any kind of APT attack is highly
organized and highly targeted in nature. There are around four techniques to understand the
cybersecurity techniques like auditing results, loss of productivity, user satisfaction and
awareness of user. Loss in productivity is one of the key measures which is needed for analyzing
the effectiveness of various IT programs. The most basic function of information security
programs is to understand the awareness of the user for various kind of issues related to
information security.
In the coming pages of the report, a proper literature review has been done on
cybersecurity awareness campaign. The report comprises of two parts that are first part is all
about creating awareness with respect to home user behavior and its drawbacks. The second part
of the report deals with general user behavior and its limitation.
Literature review
Home users
A program for awareness and training is considered to be important for understanding the
information of various all users (employees and citizen) need (Larson 2015). In information
Introduction
Cyberspace is considered to be an integrated part of the society as important data is being
transferred day and night (Bada and Sasse, 2014). Cyberspace is needed for vulnerability which
is needed for wide range of threats. Cyber perpetrators on certain number of techniques which is
needed for political and military goals (Abawajy 2014). In the domain of information technology
risk and consequence of cyber-attacks helps in improving the security in cyberspace. Advanced
persistence threats (APT) are considered to be new types of emerging threats of cyber-attack
(Kortjan and Von Solms, 2014). With the help of clear goal any kind of APT attack is highly
organized and highly targeted in nature. There are around four techniques to understand the
cybersecurity techniques like auditing results, loss of productivity, user satisfaction and
awareness of user. Loss in productivity is one of the key measures which is needed for analyzing
the effectiveness of various IT programs. The most basic function of information security
programs is to understand the awareness of the user for various kind of issues related to
information security.
In the coming pages of the report, a proper literature review has been done on
cybersecurity awareness campaign. The report comprises of two parts that are first part is all
about creating awareness with respect to home user behavior and its drawbacks. The second part
of the report deals with general user behavior and its limitation.
Literature review
Home users
A program for awareness and training is considered to be important for understanding the
information of various all users (employees and citizen) need (Larson 2015). In information

3CYBER SECURITY AWARENESS CAMPAIGN
technology, it is needed for understanding the proper things which are needed for communication
with various security needs (Topping 2017). An awareness program can be effective which is
needed for current and simple thing which needs to follow. With the increased availability, there
have been positive effects which aim to provide information which is needed for understanding
the impact when changes in individual are seen (dos Santos Lonsdale, Lonsdale and Lim 2018).
A considerable amount of information is spent by various government organization which
influences the online behavior of online. In the given security domain which is known to be a
triangle of security, functionality and lastly usability (Croasdell, Elste and Hill 2018). It mainly
aims to describe the state which is needed for creating a proper balance between the given three
parameters by making use of usability conflict goals. Perceived goals can be seen as a core
construct which is needed for understanding the various aspect of empowerment. It generally
highlights the amount of control which can oppose in the given situation (Le Compte, Elizondo
and Watson, 2015). It positive control can easily lead to control of given situation which can
easily improve their own situation. It is seen that home computer users encounter high level of
control which takes place due to exposure to risk (Kritzinger, Bada and Nurse, 2017). It is seen
that they can easily choose to visit website which comes up with small attachment which are
applied to system updates.
According to van Schaik et al. (2017), Getafe online campaign is known to be a joint
venture initiative between various government departments along with private sectors. The
campaign highlights on the various user at home and business. The positive message of getting
safe online is intriguing one which highlights the core emphasizes to various individual who
focuses on the responsibility of having it in the online mode (Shafqat and Masood, 2016). The
campaign tends to offer some kind of theory which highlights the information on the given
technology, it is needed for understanding the proper things which are needed for communication
with various security needs (Topping 2017). An awareness program can be effective which is
needed for current and simple thing which needs to follow. With the increased availability, there
have been positive effects which aim to provide information which is needed for understanding
the impact when changes in individual are seen (dos Santos Lonsdale, Lonsdale and Lim 2018).
A considerable amount of information is spent by various government organization which
influences the online behavior of online. In the given security domain which is known to be a
triangle of security, functionality and lastly usability (Croasdell, Elste and Hill 2018). It mainly
aims to describe the state which is needed for creating a proper balance between the given three
parameters by making use of usability conflict goals. Perceived goals can be seen as a core
construct which is needed for understanding the various aspect of empowerment. It generally
highlights the amount of control which can oppose in the given situation (Le Compte, Elizondo
and Watson, 2015). It positive control can easily lead to control of given situation which can
easily improve their own situation. It is seen that home computer users encounter high level of
control which takes place due to exposure to risk (Kritzinger, Bada and Nurse, 2017). It is seen
that they can easily choose to visit website which comes up with small attachment which are
applied to system updates.
According to van Schaik et al. (2017), Getafe online campaign is known to be a joint
venture initiative between various government departments along with private sectors. The
campaign highlights on the various user at home and business. The positive message of getting
safe online is intriguing one which highlights the core emphasizes to various individual who
focuses on the responsibility of having it in the online mode (Shafqat and Masood, 2016). The
campaign tends to offer some kind of theory which highlights the information on the given
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CYBER SECURITY AWARENESS CAMPAIGN
threats. The campaign focus on the theory of advice which is needed for protecting an individual
budget on threats and methods of protecting the individual and the enterprise. The charge mainly
highlights the various individual who can make use of information in much proper way.
According to Gaza, von Solms and van Vuuren (2015), the cyber-wise street campaign
highlights on various kind of user who tends to be at home and work. This new office cyber site
emphasizes on certain number of users which is needed for adopting five most basic measures
which are needed for boosting the overall security. It is mainly inclusive of the strong and
memorable password which is needed for installing the antivirus program which tends to work
with devices. It aims in checking the various kind of privacy setting which is needed on social
media. It will help in analyzing the security of the various online retailer which is done for
loading various card details (Howard and Arimatéia da Cruz, 2017). It is seen that the given
patching system aims to change the behavior. This particular campaign tends to highlight the
behavior changes which is needed for providing the system updates.
Limitation
There are large number of limitation of cybersecurity for various home-based user like
Lack of support and Time: Various kind of social awareness program are used by
professionals so that understand the ability of its execution. Three limitations are lack of support
for leadership, limitation of budget and no proper time.
Failing to create impact on users: The second thing which is taken into account is all
about the ability to engage various employees and change their behavior. It highlights the various
programs are not sticking with the leaders.
threats. The campaign focus on the theory of advice which is needed for protecting an individual
budget on threats and methods of protecting the individual and the enterprise. The charge mainly
highlights the various individual who can make use of information in much proper way.
According to Gaza, von Solms and van Vuuren (2015), the cyber-wise street campaign
highlights on various kind of user who tends to be at home and work. This new office cyber site
emphasizes on certain number of users which is needed for adopting five most basic measures
which are needed for boosting the overall security. It is mainly inclusive of the strong and
memorable password which is needed for installing the antivirus program which tends to work
with devices. It aims in checking the various kind of privacy setting which is needed on social
media. It will help in analyzing the security of the various online retailer which is done for
loading various card details (Howard and Arimatéia da Cruz, 2017). It is seen that the given
patching system aims to change the behavior. This particular campaign tends to highlight the
behavior changes which is needed for providing the system updates.
Limitation
There are large number of limitation of cybersecurity for various home-based user like
Lack of support and Time: Various kind of social awareness program are used by
professionals so that understand the ability of its execution. Three limitations are lack of support
for leadership, limitation of budget and no proper time.
Failing to create impact on users: The second thing which is taken into account is all
about the ability to engage various employees and change their behavior. It highlights the various
programs are not sticking with the leaders.

5CYBER SECURITY AWARENESS CAMPAIGN
General users
Awareness and training programs are considered to be crucial which is needed for
dissemination from all users like employee and citizen (Kim et al. 2018). In the matter of
information technology program which is needed for communicating with the given security
requirements. A proper awareness and training program should be there which is considered to
be effective in nature. In the domain of public, government aim to encourage the fact that how
citizen can easily transact the various online and dispense the various kinds of advice of
processing with the thing (Sherif, Furnell and Clarke, 2015). However, in many cases, the
cybersecurity needs to attack on continue on regular basis. The fact should be taken into account
that cybersecurity attacks tend to continue. With the passage of time, the attackers tend to
become skilled. They are increasing the security interface due to which the attackers are
becoming very skilled (Skinner et al. 2018). The fact has been proposed that proper security and
practices of privacy are designed in the given system from the beginning. A system which is too
difficult will easily lead to various users for many types of mistakes. The fact should be taken
into account that various individual encounters any kinds of warning which is needed for the
protection of vital information.
According to Bullée et al., (2015), the increasing availability of various kind of
information has led to various kinds of positive effect. It aims to provide information which is
modest and creates impact on the life of various people. A proper amount of investment should
be there by various government bodies and organization which tend to influence the online
behavior. The fact should be taken into account that individual knowledge and skills are needed
for having a proper understanding of cybersecurity (Yunos, Ab Hamid and Ahmad, 2016). Apart
from this, it aims in influencing the experience, attitudes and lastly beliefs of various influencers.
General users
Awareness and training programs are considered to be crucial which is needed for
dissemination from all users like employee and citizen (Kim et al. 2018). In the matter of
information technology program which is needed for communicating with the given security
requirements. A proper awareness and training program should be there which is considered to
be effective in nature. In the domain of public, government aim to encourage the fact that how
citizen can easily transact the various online and dispense the various kinds of advice of
processing with the thing (Sherif, Furnell and Clarke, 2015). However, in many cases, the
cybersecurity needs to attack on continue on regular basis. The fact should be taken into account
that cybersecurity attacks tend to continue. With the passage of time, the attackers tend to
become skilled. They are increasing the security interface due to which the attackers are
becoming very skilled (Skinner et al. 2018). The fact has been proposed that proper security and
practices of privacy are designed in the given system from the beginning. A system which is too
difficult will easily lead to various users for many types of mistakes. The fact should be taken
into account that various individual encounters any kinds of warning which is needed for the
protection of vital information.
According to Bullée et al., (2015), the increasing availability of various kind of
information has led to various kinds of positive effect. It aims to provide information which is
modest and creates impact on the life of various people. A proper amount of investment should
be there by various government bodies and organization which tend to influence the online
behavior. The fact should be taken into account that individual knowledge and skills are needed
for having a proper understanding of cybersecurity (Yunos, Ab Hamid and Ahmad, 2016). Apart
from this, it aims in influencing the experience, attitudes and lastly beliefs of various influencers.

6CYBER SECURITY AWARENESS CAMPAIGN
Both personal motivation and personal ability are considered to be two most powerful kind of
resources. It is needed for addressing for understanding the difference between what people can
say and people can do. In some of the situation, it is seen that people need to overcome the
current pattern or thoughts which is gathered from the habits.
According to Alshaikh et al. (2018), cultural or individual is also an important factor
which can have positive and negative effect on the life of people. Both message and
advertisement are considered to be an important parameter which is needed for designing the
education along with awareness messages. The current cultural system of the society aims to
shape the society for various kind of psychological behaviors. There is large number of attempts
for changing the behavior of various users. It can be easily bombarded by various types of
messages on the given issues. However, in some of the instances it can be seen that the design
message should be taken into account (Gratian et al. 2018). There comes up a big amount of gap
which is there between understanding the threat and understanding the behavior at given
intervals. For various security awareness program, the behavior of the user should be taken into
account. Various user need to adopt which is considered to be simple and easy for highlight the
various advantages.
According to Yunos, Ab Hamid and Ahmad, (2016), perceived control and its ability
control provides a proper kind of sense which is needed for driving specific behavior. It has been
analyzed that the specific behavior of the people can easily affect the real behavior. The security
awareness campaign should come up with consistent rules of behavior of the people (Alshaikh et
al. 2018). The perception of control will ultimately lead to better acceptance of suggestion
behavior. In some of the cases, it is seen that the effect of information security awareness in the
public can be very much complicated in nature.
Both personal motivation and personal ability are considered to be two most powerful kind of
resources. It is needed for addressing for understanding the difference between what people can
say and people can do. In some of the situation, it is seen that people need to overcome the
current pattern or thoughts which is gathered from the habits.
According to Alshaikh et al. (2018), cultural or individual is also an important factor
which can have positive and negative effect on the life of people. Both message and
advertisement are considered to be an important parameter which is needed for designing the
education along with awareness messages. The current cultural system of the society aims to
shape the society for various kind of psychological behaviors. There is large number of attempts
for changing the behavior of various users. It can be easily bombarded by various types of
messages on the given issues. However, in some of the instances it can be seen that the design
message should be taken into account (Gratian et al. 2018). There comes up a big amount of gap
which is there between understanding the threat and understanding the behavior at given
intervals. For various security awareness program, the behavior of the user should be taken into
account. Various user need to adopt which is considered to be simple and easy for highlight the
various advantages.
According to Yunos, Ab Hamid and Ahmad, (2016), perceived control and its ability
control provides a proper kind of sense which is needed for driving specific behavior. It has been
analyzed that the specific behavior of the people can easily affect the real behavior. The security
awareness campaign should come up with consistent rules of behavior of the people (Alshaikh et
al. 2018). The perception of control will ultimately lead to better acceptance of suggestion
behavior. In some of the cases, it is seen that the effect of information security awareness in the
public can be very much complicated in nature.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CYBER SECURITY AWARENESS CAMPAIGN
Limitation
There is large number of limitation of cyber security awareness program for general user
like:
In some of the cases, the awareness program is not unique in nature.
Improper engaging of materials.
Improper collection of metrics
Unreasonable expectation
Depending on single training exercise.
Conclusion
From the above pages of the report a proper literature review on cybersecurity awareness.
The literature review comprises two section that is home users and their limitation and secondly
general users and its limitation. The report highlights the evaluation of security for various cyber
networks which is under advanced persistence threats. The effect of various factors on the
equilibrium security on the cyber network has been discussed in details. The equilibrium security
is almost applicable to various methods for evaluation for real-world networks under APT. There
is large number of issues with respect to security evaluation of the cyber network under APT.
The defense strategy helps in increasing the security of the network. When the attack strategy is
not unknown, there are mainly two steps for solving the organization issues. For each of the
defense strategy, a possible attack strategy is needed for reducing the security of the given
network among all the possibilities of attack. It helps in determining a possible defense strategy
which aims in maximizing and minimizing strategy of the network.
Limitation
There is large number of limitation of cyber security awareness program for general user
like:
In some of the cases, the awareness program is not unique in nature.
Improper engaging of materials.
Improper collection of metrics
Unreasonable expectation
Depending on single training exercise.
Conclusion
From the above pages of the report a proper literature review on cybersecurity awareness.
The literature review comprises two section that is home users and their limitation and secondly
general users and its limitation. The report highlights the evaluation of security for various cyber
networks which is under advanced persistence threats. The effect of various factors on the
equilibrium security on the cyber network has been discussed in details. The equilibrium security
is almost applicable to various methods for evaluation for real-world networks under APT. There
is large number of issues with respect to security evaluation of the cyber network under APT.
The defense strategy helps in increasing the security of the network. When the attack strategy is
not unknown, there are mainly two steps for solving the organization issues. For each of the
defense strategy, a possible attack strategy is needed for reducing the security of the given
network among all the possibilities of attack. It helps in determining a possible defense strategy
which aims in maximizing and minimizing strategy of the network.

8CYBER SECURITY AWARENESS CAMPAIGN
References
Abawajy, J., 2014. User preference of cyber security awareness delivery methods. Behaviour &
Information Technology, 33(3), pp.237-248.
Alshaikh, M., Maynard, S.B., Ahmad, A. and Chang, S., 2018. An Exploratory Study of Current
Information Security Training and Awareness Practices in Organizations.
Bada, M. and Sasse, A., 2014. Cyber security awareness campaigns: Why do they fail to change
behaviour?.
Bullée, J.W.H., Montoya, L., Pieters, W., Junger, M. and Hartel, P.H., 2015. The persuasion and
security awareness experiment: reducing the success of social engineering attacks. Journal of
experimental criminology, 11(1), pp.97-115.
Croasdell, D., Elste, J. and Hill, A., 2018. Cyber Clinics: Re-imagining Cyber Security
Awareness.
dos Santos Lonsdale, M., Lonsdale, D. and Lim, H.W., 2018. The impact of delivering online
information neglecting user-centered information design principles. Cyber security awareness
websites as a case study. Information Design Journal.
Gcaza, N., von Solms, R. and van Vuuren, J.J., 2015. An Ontology for a National Cyber-Security
Culture Environment. In HAISA (pp. 1-10).
Gratian, M., Bandi, S., Cukier, M., Dykstra, J. and Ginther, A., 2018. Correlating human traits
and cyber security behavior intentions. computers & security, 73, pp.345-358.
References
Abawajy, J., 2014. User preference of cyber security awareness delivery methods. Behaviour &
Information Technology, 33(3), pp.237-248.
Alshaikh, M., Maynard, S.B., Ahmad, A. and Chang, S., 2018. An Exploratory Study of Current
Information Security Training and Awareness Practices in Organizations.
Bada, M. and Sasse, A., 2014. Cyber security awareness campaigns: Why do they fail to change
behaviour?.
Bullée, J.W.H., Montoya, L., Pieters, W., Junger, M. and Hartel, P.H., 2015. The persuasion and
security awareness experiment: reducing the success of social engineering attacks. Journal of
experimental criminology, 11(1), pp.97-115.
Croasdell, D., Elste, J. and Hill, A., 2018. Cyber Clinics: Re-imagining Cyber Security
Awareness.
dos Santos Lonsdale, M., Lonsdale, D. and Lim, H.W., 2018. The impact of delivering online
information neglecting user-centered information design principles. Cyber security awareness
websites as a case study. Information Design Journal.
Gcaza, N., von Solms, R. and van Vuuren, J.J., 2015. An Ontology for a National Cyber-Security
Culture Environment. In HAISA (pp. 1-10).
Gratian, M., Bandi, S., Cukier, M., Dykstra, J. and Ginther, A., 2018. Correlating human traits
and cyber security behavior intentions. computers & security, 73, pp.345-358.

9CYBER SECURITY AWARENESS CAMPAIGN
Howard, T.D. and Arimatéia da Cruz, J.D., 2017. Stay the course: Why trump must build on
obama’s cybersecurity policy. Information Security Journal: A Global Perspective, 26(6),
pp.276-286.
Kim, E., Jensen, M.B., Poreh, D. and Agogino, A.M., 2018. NOVICE DESIGNER'S LACK OF
AWARENESS TO CYBERSECURITY AND DATA VULNERABILITY IN NEW CONCEPT
DEVELOPMENT OF MOBILE SENSING DEVICES. In DS92: Proceedings of the DESIGN
2018 15th International Design Conference (pp. 2035-2044).
Kortjan, N. and Von Solms, R., 2014. A conceptual framework for cyber-security awareness and
education in SA. South African Computer Journal, 52(1), pp.29-41.
Kritzinger, E., Bada, M. and Nurse, J.R., 2017, May. A study into the cybersecurity awareness
initiatives for school learners in South Africa and the UK. In IFIP World Conference on
Information Security Education (pp. 110-120). Springer, Cham.
Larson, S., 2015. The cyber security fair: An effective method for training users to improve their
cyber security behaviors. Information Security Education Journal, 2(1), pp.11-19.
Le Compte, A., Elizondo, D. and Watson, T., 2015, May. A renewed approach to serious games
for cyber security. In Cyber conflict: Architectures in cyberspace (CyCon), 2015 7th
international conference on (pp. 203-216). IEEE.
Shafqat, N. and Masood, A., 2016. Comparative analysis of various national cyber security
strategies. International Journal of Computer Science and Information Security, 14(1), p.129.
Howard, T.D. and Arimatéia da Cruz, J.D., 2017. Stay the course: Why trump must build on
obama’s cybersecurity policy. Information Security Journal: A Global Perspective, 26(6),
pp.276-286.
Kim, E., Jensen, M.B., Poreh, D. and Agogino, A.M., 2018. NOVICE DESIGNER'S LACK OF
AWARENESS TO CYBERSECURITY AND DATA VULNERABILITY IN NEW CONCEPT
DEVELOPMENT OF MOBILE SENSING DEVICES. In DS92: Proceedings of the DESIGN
2018 15th International Design Conference (pp. 2035-2044).
Kortjan, N. and Von Solms, R., 2014. A conceptual framework for cyber-security awareness and
education in SA. South African Computer Journal, 52(1), pp.29-41.
Kritzinger, E., Bada, M. and Nurse, J.R., 2017, May. A study into the cybersecurity awareness
initiatives for school learners in South Africa and the UK. In IFIP World Conference on
Information Security Education (pp. 110-120). Springer, Cham.
Larson, S., 2015. The cyber security fair: An effective method for training users to improve their
cyber security behaviors. Information Security Education Journal, 2(1), pp.11-19.
Le Compte, A., Elizondo, D. and Watson, T., 2015, May. A renewed approach to serious games
for cyber security. In Cyber conflict: Architectures in cyberspace (CyCon), 2015 7th
international conference on (pp. 203-216). IEEE.
Shafqat, N. and Masood, A., 2016. Comparative analysis of various national cyber security
strategies. International Journal of Computer Science and Information Security, 14(1), p.129.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10CYBER SECURITY AWARENESS CAMPAIGN
Sherif, E., Furnell, S. and Clarke, N., 2015, December. Awareness, behaviour and culture: The
ABC in cultivating security compliance. In Internet Technology and Secured Transactions
(ICITST), 2015 10th International Conference for(pp. 90-94). IEEE.
Skinner, T., Taylor, J., Dale, J. and McAlaney, J., 2018, April. The Development of Intervention
E-Learning Materials and Implementation Techniques For Cyber-Security Behaviour Change.
ACM SIG CHI.
Topping, C., 2017. The role of awareness in adoption of government cyber security initiatives: A
study of SMEs in the UK.
van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk
perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75,
pp.547-559.
Yunos, Z., Ab Hamid, R.S. and Ahmad, M., 2016, July. Development of a cyber security
awareness strategy using focus group discussion. In SAI Computing Conference (SAI), 2016 (pp.
1063-1067). IEEE.
Sherif, E., Furnell, S. and Clarke, N., 2015, December. Awareness, behaviour and culture: The
ABC in cultivating security compliance. In Internet Technology and Secured Transactions
(ICITST), 2015 10th International Conference for(pp. 90-94). IEEE.
Skinner, T., Taylor, J., Dale, J. and McAlaney, J., 2018, April. The Development of Intervention
E-Learning Materials and Implementation Techniques For Cyber-Security Behaviour Change.
ACM SIG CHI.
Topping, C., 2017. The role of awareness in adoption of government cyber security initiatives: A
study of SMEs in the UK.
van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk
perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75,
pp.547-559.
Yunos, Z., Ab Hamid, R.S. and Ahmad, M., 2016, July. Development of a cyber security
awareness strategy using focus group discussion. In SAI Computing Conference (SAI), 2016 (pp.
1063-1067). IEEE.
1 out of 11
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.