Jan 12, 2022 | Research library
In this research, the impact of the coronavirus pandemic on the security behaviour of academic businesses is uncovered. This is done by comparing the pre-pandemic annual cyber security survey with the peak and post-pandemic survey, i.e., 2019, 2020 and 2021...
Jan 1, 2022 | Research library
Technology plays a vital role to overcome some of the challenges caused by Covid-19. For example, adopting cloud computing during pandemic has become double to handle the highest accelerating of process data through the cloud. However, the sudden and heavy use of...
Jan 1, 2022 | Research library
Phishing is an identity theft evasion strategy used in which consumers accept bogus emails from fraudulent accounts that claim to belong to a legal and real company in the effort to steal sensitive information of the client. This act places many users’ privacy at...
Dec 30, 2021 | Journal article, Research library
This study delves into the motivations behind fraudulent customer behavior on eBay, a phenomenon that imposes significant financial losses on online businesses. To investigate this issue, a conceptual framework is developed, extending the Theory of Planned Behavior...
Dec 14, 2021 | Journal article, Research library
In this paper, we present findings from a large-scale and long-term phishing experiment that we conducted in collaboration with a partner company. Our experiment ran for 15 months during which time more than 14,000 study participants (employees of the company)...
Dec 6, 2021 | Research library
Cyber resiliency of an organization depends on the IT infrastructure and cyber security measures undertaken; however, a prominent factor to achieve resilience depends on the employees. Confronted with this bleak realization, it is only recently that the need for cyber...