Research Article

Assessing Information Security Awareness for a Tailored Intervention Program: A Study of Employees at Ifugao State University, Cordillera Administrative Region, Philippines

Authors

Abstract

Cybersecurity, especially information security, is a shared responsibility. Given that information is vital for any organization, this study was conducted to evaluate information security awareness (ISA) among the employees at Ifugao State University (IFSU) across its six campuses. It employed a quantitative approach, primarily using the descriptive research method. By utilizing a semi-structured questionnaire from the Human Aspects of Information Security Questionnaire (HAIS-Q), data were collected from the five hundred (n=500) employees and analyzed using statistical methods such as ANOVA, post-hoc tests, and independent t-tests. The findings revealed that IFSU employees generally exhibit moderate awareness of information security, with significant age-related differences but no notable differences based on sex or type of employee. Interestingly, both younger and older employees demonstrated inconsistent behaviors despite possessing sufficient knowledge and attitudes. To improve the ISA among IFSU employees, a customized, tailored, age-sensitive intervention program has been proposed.

Keywords:

Descriptive Survey Ifugao State University Information Security Awareness Knowledge-Attitude-Behavior Level

Article information

Journal

Journal of Arts, Humanities and Social Science

Volume (Issue)

2(3), (2025)

Pages

143-155

Published

03-11-2025

How to Cite

Pugong, F. J. A. (2025). Assessing Information Security Awareness for a Tailored Intervention Program: A Study of Employees at Ifugao State University, Cordillera Administrative Region, Philippines. Journal of Arts, Humanities and Social Science, 2(3), 143-155. https://doi.org/10.69739/jahss.v2i3.1132

References

Ahmad, M., Shari, A. M. J., Razali, R. R., & Sujak, A. F. A. (2023). Knowledge, attitude, and practices towards internet safety and security among Generation Z in Malaysia: A conceptual paper. In S. K. Bhar & H. Rahmat (Eds.), Proceedings of the International Conference on Communication, Language, Education and Social Sciences (CLESS 2022) (pp. 4–10). Atlantis Press. https://doi.org/10.2991/978-2-494069-61-9_2 DOI: https://doi.org/10.2991/978-2-494069-61-9_2

Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376

Alharthi, S., & Alghamdi, A. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376 DOI: https://doi.org/10.1016/j.chb.2022.107376

AlMindeel, R., & Martins, J. T. (2021). Information security awareness in a developing country context: insights from the government sector in Saudi Arabia. Information Technology & People, 34(2), 770-788. DOI: https://doi.org/10.1108/ITP-06-2019-0269

Alotaibi, S., Alruban, A., Furnell, S., & Clarke, N. (2019). A novel behaviour profiling approach to continuous authentication for mobile applications. In Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019) (pp. 246–251). https://doi.org/10.5220/0007313302460251 DOI: https://doi.org/10.5220/0007313302460251

Alqahtani, H., & Kavakli-Thorne, M. (2020). Exploring factors affecting user's cybersecurity behaviour by using mobile augmented reality app (CybAR). In Proceedings of the 2020 12th International Conference on Computer and Automation Engineering (ICCAE 2020) (pp. 129–135). Association for Computing Machinery. https://doi.org/10.1145/3384613.3384629 DOI: https://doi.org/10.1145/3384613.3384629

Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98, 102003. https://doi.org/10.1016/j.cose.2020.102003 DOI: https://doi.org/10.1016/j.cose.2020.102003

Asiamah, N., Bempong, J. A., & Sghaier, M. (2024). Internet self-efficacy moderates the association of information technology ability with successful ageing among older employees in three African samples. European Journal of Ageing, 21, Article 31. https://doi.org/10.1007/s10433-024-00827-9 DOI: https://doi.org/10.1007/s10433-024-00827-9

Asker, H., & Tamtam, A. G. (2020). An investigation of the information security awareness and practices among third level education staff: Case study in Nalut, Libya. European Scientific Journal, 16(15), 20-32. DOI: https://doi.org/10.19044/esj.2020.v16n15p20

Assenza, G., Chittaro, A., De Maggio, M. C., Mastrapasqua, M., & Setola, R. (2020). A review of methods for evaluating security awareness initiatives. European Journal for Security Research, 5(2), 259-287. DOI: https://doi.org/10.1007/s41125-019-00052-x

Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., & Sookhak, M. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587-597. DOI: https://doi.org/10.1016/j.future.2019.03.024

Bognár, L., & Bottyán, L. (2024). Evaluating online security behavior: Development and validation of a personal cybersecurity awareness scale for university students. Education Sciences, 14(6), 588. DOI: https://doi.org/10.3390/educsci14060588

Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies, 2022(1), Article 2693080. https://doi.org/10.1155/2022/2693080 DOI: https://doi.org/10.1155/2022/2693080

Busse, J., Busse, R., & Schumann, M. (2023). Does technology matter? How digital self-efficacy affects the relationship between ICT exposure and job dissatisfaction [Manuscript]. University of Göttingen. https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/0c9a24b0-3d43-42ff-b955-9c7471db1b1a/content

CELIS Institute. (2018, July 19). Data protection privacy policy

Check Point Cyber Security Report. (2022, May 21). Check Point Cyber Security Report: Global cyber pandemic’s magnitude revealed. Security Insight.

Cheng, D. (2021). Applicability of information governance for data privacy compliance in the education sector. DLSU Research Congress 2021. https://www.dlsu.edu.ph

Coffey, L. (2023). MOVEit signals growing cybersecurity threats for higher ed. Insiders Report. https://www.insidehighered.com

Connolly, L. Y., & Wall, D. S. (2019). The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Computers & Security, 87, 101568. DOI: https://doi.org/10.1016/j.cose.2019.101568

Corradini, I., & Nardelli, E. (2020). Developing digital awareness at school: A fundamental step for cybersecurity education. In Advances in Human Factors in Cybersecurity. Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-52581-1_14

CultureAI. (2024). Time to adapt: The state of human risk management in 2024.

CYFIRMA. (2023, October 9). Philippines threat overview. https://www.cyfirma.com

Dacanay, D. J. B., Quinto, M. S., Parayno, J. F., & Fajutagana, J. (2024). A comparative study of the Philippines in a global cybersecurity context and its implications on local cybersecurity practices. ResearchGate. https://www.researchgate.net/publication/380268096

Datta, P. M., & Nwankpa, J. K. (2023). Remote workers are more aware of cybersecurity risks than in-office employees: New study. ProQuest. https://www.proquest.com DOI: https://doi.org/10.64628/AAI.mxgh3tve7

Dawson, M., Wright, J., & Omar, M. (2015). Mobile devices: The case for cyber security hardened systems. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 8-29). IGI Global Scientific Publishing. DOI: https://doi.org/10.4018/978-1-4666-8345-7.ch002

De Maggio, M. C., Mastrapasqua, M., Tesei, M., Chittaro, A., & Setola, R. (2019). How to improve the security awareness in complex organizations. In International Conference on Applied Human Factors and Ergonomics. Springer. https://www.researchgate.net DOI: https://doi.org/10.1007/s41125-017-0028-2

Department of Information and Communication Technology. (2019, September 14). National ICT Household Survey Summary Report. https://dict.gov.ph

De Zan, T. (2019). Mind the gap: The cyber security skills shortage and public policy interventions. https://www.ctga.ox.ac.uk DOI: https://doi.org/10.4324/9780367822576-12

ENISA. (2019, May 7). ENISA threat landscape report 2018: 15 top cyber-threats and trends. Heraklion: European Network and Information Security Agency (ENISA).

Escobar, D. T. C. (2022). Cybersecurity Knowledge of The Cagayan State University Academic Community: Basis for Cybersecurity Policy. Journal of Positive School Psychology, 6(5).

Eydgahi, A., & Rajab, M. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80. DOI: https://doi.org/10.1016/j.cose.2018.09.016

Fadlika, R., Ruldeviyani, Y., Butarbutar, Z. T., Istiqomah, R. A., & Fariz, A. A. (2023). Employee information security awareness in the power generation sector of PT ABC. International Journal of Advanced Computer Science and Applications, 14(4), 594–601. DOI: https://doi.org/10.14569/IJACSA.2023.0140465

Fenelly, L., & Perry, M. (2020). Handbook of loss prevention and crime prevention (6th ed.). ScienceDirect. DOI: https://doi.org/10.1016/B978-0-12-817273-5.00005-3

Fernando, W. P. K., Dissanayake, D. A. N. P., Dushmantha, S. G. V. D., Liyanage, D. L. C. P., & Karunatilake, C. (2023). Challenges and opportunities in password management: a review of current solutions. Sri Lanka Journal of Social Sciences and Humanities, 3(2). DOI: https://doi.org/10.4038/sljssh.v3i2.96

Fertig, T., & Schütz, A. (2020). About the measuring of information security awareness: A systematic literature review. In Proceedings of the 53rd Hawaii International Conference on System Sciences. DOI: https://doi.org/10.24251/HICSS.2020.798

Flores, R., & Ching, M. (2018). Philippine SUCs compliance performance on RA 10173: A case study on Bukidnon State University. ACM International Conference Proceeding Series. https://www.dlsu.edu.ph DOI: https://doi.org/10.1145/3234781.3234790

Giwah, A. D., Wang, L., Levy, Y., & Hur, I. (2020). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory. Journal of Intellectual Capital, 21(2), 215–233. https://doi.org/10.1108/JIC-03-2019-0063 DOI: https://doi.org/10.1108/JIC-03-2019-0063

Glaspie, H. (2018). Assessment of information security culture in higher education (Electronic thesis No. 6009). University of Central Florida. https://stars.library.ucf.edu

Greig, J. (2023). University of Michigan severs ties to Internet after cyberattack. The Record.

Hadlington, L. (2017). Human factors in cybersecurity: Examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. https://doi.org/ 10.1016/j.heliyon.2017.e00346 DOI: https://doi.org/10.1016/j.heliyon.2017.e00346

Haeussinger, F., & Kranz, J. (2017). Antecedents of employees' information security awareness: Review, synthesis, and directions for future research. Association for Information Systems Electronic Library.

Hakkala, A., Isoaho, J., & Virtanen, S. (2018). Cyber security competence in working life. https://www.culture.ai/resources/reports/time-to-adapt-the-state-of-human-risk-management-in-2024

IFSU-MIS. (2023, December 29). Information management. https://mis.ifsu.edu.ph

Incident Report. (2024, June 8). What is incident reporting? https://www.incidentreport.net

Information Systems Audit and Control Association. (2023, October 2). ISACA’s state of cybersecurity 2023 report.

IPV Network. (2023, August 28). Riding the digital wave: Cybersecurity realities in the Philippines.

Al-Shanfari, I., Yassin, W., Tabook, N., Ismail, R., & Ismail, A. (2022). Determinants of information security awareness and behaviour strategies in public sector organizations among employees. International Journal of Advanced Computer Science and Applications, 13(8). DOI: https://doi.org/10.14569/IJACSA.2022.0130855

Jiow, H. J., Mwagwabi, F., & Low-Lim, A. (2021). Effectiveness of protection motivation theory based: Password hygiene training programme for youth media literacy education. Journal of Media Literacy Education, 13(1), 67–78. https://doi.org/10.23860/JMLE-2021-13-1-6 DOI: https://doi.org/10.23860/JMLE-2021-13-1-6

Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & security, 106, 102267. DOI: https://doi.org/10.1016/j.cose.2021.102267

Kont, K. (2023). Information security awareness of librarians in the Baltic countries: A comparative analysis. Baltic Journal of Modern Computing, 11(3), 450–474. https://www.researchgate.net DOI: https://doi.org/10.22364/bjmc.2023.11.3.07

Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. DOI: https://doi.org/10.1016/j.ijinfomgt.2018.10.017

Li, W., Lee, J., Purl, J., Greitzer, F. L., Yousefi, B., & Laskey, K. B. (2020). Experimental investigation of demographic factors related to phishing susceptibility. 53rd Hawaii International Conference on System Sciences. DOI: https://doi.org/10.24251/HICSS.2020.274

Luevanos, C., Elizarraras, J., Hirschi, K., & Yeh, J. (2017). Analysis on the security and use of password managers. 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT). DOI: https://doi.org/10.1109/PDCAT.2017.00013

Mai, P., & Tick, A. (2021). Cyber security awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam. Acta Polytechnica Hungarica, 18, 67–89. https://doi.org/10.12700/APH.18.8.2021.8.4 https://acta.uni-obuda.hu/ Mai_Tick_115.pdf DOI: https://doi.org/10.12700/APH.18.8.2021.8.4

Manila Bulletin. (2020, June 19). PUP, FEU probe hacking of student portal.

Mbaka, W., & Tuma, K. (2024). Role of Gender in the Evaluation of Security Decisions. IEEE Security & Privacy, 22(2), 38-48. https://networkinstitute.org/2024/01/26/research-spotlight-gender-and-cybersecurity-decisions/ DOI: https://doi.org/10.1109/MSEC.2023.3343837

McCombes, S. (2019). Descriptive research. Scribbr.

Mimecast Limited. (2020, October 27). Mimecast research: Half of workers admit to opening emails they considered suspicious. GlobeNewswire. https://www.globenewswire.com/en/news-release/2020/10/27/2114887/0/en/Mimecast-Research-Half-of-Workers-Admit-to-Opening-Emails-They-Considered-Suspicious.html

Morgan, S. (2016). Cybersecurity business report. CSO.

National Cybersecurity Alliance & CybSafe. (2023). Oh behave! The annual cybersecurity attitudes and behaviors report 2023. https://staysafeonline.org/online-safety-privacy-basics/oh-behave/

National Privacy Commission. (2020, October 22). CID BN 19 067 in re University of the East resolution 2020.

News Channel 9. (2023, August 16). Cleveland City Schools hit by ransomware attack Tuesday, personal data not affected.

Ngo, M. (2021). Howard University hit by a ransomware attack. The New York Times.

Nguyen, B. H., & Le, H. N. Q. (2024). Investigation on information security awareness based on KAB model: the moderating role of age and education level. Information & Computer Security, 32(5), 598-612. https://doi.org/10.1108/ICS-09-2023-0152

Nguyen, T. D., & Le, D. H. (2024). Information security awareness in Vietnamese organizations: A KAB model approach. Information & Computer Security, 32(1), 89–110. https://doi.org/10.1108/ICS-09-2023-0152 DOI: https://doi.org/10.1108/ICS-09-2023-0152

Nicholson, J., Coventry, L., & Briggs, P. (2023). Cybersecurity personas for older adults. In Proceedings of the GoodIT '23: ACM International Conference on Information Technology for Social Good (pp. 1–7). Northumbria University. https://researchportal.northumbria.ac.uk/files/112884337/goodit23_55.pdf

Nugraha, A. C., Hidayanto, A. N., Indriany, H. S., Kurniati, H., Firdaus, B. M., & Bastara, A. (2022). Cybersecurity project implementation for resources protection: A case study of the National Narcotics Board. IOP Conference Series: Materials Science and Engineering. DOI: https://doi.org/10.1088/1755-1315/969/1/012061

Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245–255. https://doi.org/10.6007/IJARBSS/v11-i19/11733 DOI: https://doi.org/10.6007/IJARBSS/v11-i19/11733

Omorog, C. D., & Medina, R. P. (2017). Internet security awareness of Filipinos: A survey paper. arXiv. https://arxiv.org/abs/2012.03669

O’Flaherty, K. (2021). Breaking down five 2018 breaches and what they mean for security in 2019. Forbes.

Pacheco, E. (2024). Older adults’ safety and security online: A post-pandemic exploration of attitudes and behaviors. PhilArchive. https://philarchive.org/archive/PACOAS DOI: https://doi.org/10.31219/osf.io/58vqw_v1

Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51. DOI: https://doi.org/10.1016/j.cose.2017.01.004

Paulsen, C., & Byers, R. (2019). Glossary of key information security terms (NIST Special Publication 800-114). National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114.pdf

Pearman, S., Zhang, S., Bauer, L., Christin, N., & Cranor, L. (2019). Why people (don’t) use password managers effectively. USENIX Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Boise State UniversityScholarWorks. https://scholarworks.boisestate.edu/cs_fac_pubs/148/

Philippine Daily Inquirer. (2023, November 3). Cybersecurity awareness in PH needs improvement.

Philippine Institute for Development Studies. (2021, August 16). Did you know that awareness of cybersecurity and data privacy in PH is low?.

Philippine News Agency. (2024, April 30). Romblon State University assesses data breach after website hacking.

Pike, A. (2019). An evaluation of the information security awareness of university students. [Unpublished master's thesis].

Pollini, A., Callari, T., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., & Guerri, D. (2021). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology and Work. Springer Nature. DOI: https://doi.org/10.1007/s10111-021-00683-y

Puspitaningrum, E. A., Devani, F. T., Putri, V. Q., & Hidayanto, A. N. (2018). Measurement of employee information security awareness: Case study at the Directorate General of Resources Management and Postal and Information Technology Equipment Ministry of Communications and Information Technology. Advances in Science, Technology, and Engineering Systems Journal, 5. https://www.researchgate.net DOI: https://doi.org/10.1109/IAC.2018.8780571

Quisumbing, L. (2019). Preemptive evaluation through information security awareness: Perception of information technology students in a Philippine State University.

Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021). Human factors in cybersecurity: A scoping review. In The 12th International Conference on Advances in Information Technology. DOI: https://doi.org/10.1145/3468784.3468789

Rauf, U., Mohsen, F., & Wei, Z. (2023). A taxonomic classification of insider threats: Existing techniques, future directions & recommendations. Journal of Cyber Security and Mobility, 12(2), 221–252. https://doi.org/ 10.13052/jcsm2245-1439.1225 DOI: https://doi.org/10.13052/jcsm2245-1439.1225

Rohan, R., Pal, D., Hautamäki, J., Funilkul, S., Chutimaskul, W., & Thapliyal, H. (2023). A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon, 9(3). DOI: https://doi.org/10.1016/j.heliyon.2023.e14234

Sari, P. K., Handayani, P. W., & Hidayanto, A. N. (2023). Demographic comparison of information security behavior toward health information system protection: Survey study. JMIR Formative Research, 7, e49439. https://doi.org/10.2196/49439 DOI: https://doi.org/10.2196/49439

Sarker, I. H. (2021). CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things, 14, 100393. DOI: https://doi.org/10.1016/j.iot.2021.100393

Senthilkumar, K., & Easwaramoorthy, S. (2017). A survey on cyber security awareness among college students in Tamil Nadu. IOP Conference Series: Materials Science and Engineering, 263, 042043. DOI: https://doi.org/10.1088/1757-899X/263/4/042043

SHARP. (2017, January 9). Information security brochure (18644).

Shishkova, T. (2021). IT threat evolution in Q3 2021: Mobile statistics. Securelist.

Sommestad, T. (2018). Work-related groups and information security policy compliance. Information & Computer Security, 26. DOI: https://doi.org/10.1108/ICS-08-2017-0054

Spanning. (2018). Cybersecurity and risk awareness - Spanning report. https://spanning.com/resources/reports/trends-us-worker-cyber-risk-aversion-threat-preparedness/

Stanford University. (2024, March 11). Update on Department of Public Safety data security incident.

Sundaram, R., & Shetty, S. (2022). Privacy concerns and protection behavior during the Covid-19 pandemic. Problems and Perspectives in Management, 20(2), 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06 DOI: https://doi.org/10.21511/ppm.20(2).2022.06

The Inquirer. (2017, November 11). Massive data breach has cost Equifax nearly $90 million.

ThreatDown. (2024, January 24). 2024 state of ransomware in education: 92% spike in K-12 attacks. ThreatDown Newsletter.

Tran, D. V., Nguyen, P. V., Vrontis, D., Nguyen, S. T. N., & Dinh, P. U. (2024). Unraveling influential factors shaping employee cybersecurity behaviors: An empirical investigation of public servants in Vietnam. Journal of Asia Business Studies, 18(6), 1445–1464. https://doi.org/10.1108/JABS-01-2024-0058 DOI: https://doi.org/10.1108/JABS-01-2024-0058

U.S. Department of Education. (2024, June 3). Data security: K-12 and higher education.

Umejiaku, A. P., Dhakal, P., & Sheng, V. S. (2023). Balancing password security and user convenience: Exploring the potential of prompt models for password generation. Electronics, 12(10), 2159. https://doi.org/ 10.3390/electronics12102159 DOI: https://doi.org/10.3390/electronics12102159

University of Arkansas. (2023, November 30). Phishing emails targeting university accounts.

University of Chicago. (2023). Digital studies M.A. and B.A./M.A. (DIGS) student manual 2023–2024. https://humanities.uchicago.edu/sites/default/files/DIGS%202023-2024%20Handbook_0.pdf

University of Michigan. (2023, August 23). August 2023 data incident.

Vaidya, R. (2022). Cyber security breaches survey 2019. Department for Digital, Culture, Media and Sport. DOI: https://doi.org/10.12968/S1361-3723(22)70568-4

Verizon's Data Breach. (2023, January 30). Data breach investigation report.

Wachtel, C. (2023). Industry study 2023: Employees ignore data handling guidelines. XPLM. https://www.xplm.com/news/press/industry-study-2023-employees-ignore-data-handling-guidelines/

Wash, R., & Rader, E. (2021). Prioritizing security over usability: Strategies for how people choose passwords. Journal of Cybersecurity, 7(1), tyab012. https://doi.org/10.1093/cybsec/tyab012 DOI: https://doi.org/10.1093/cybsec/tyab012

Washington Technology Solutions. (2024, January). Information security awareness. Office of Cybersecurity, State of Washington. https://watech.wa.gov/information-security-awareness-january-2024

Yerby, J., & Floyd, K. (2018). Faculty and staff information security awareness and behaviors. Journal of The Colloquium for Information Systems Security Education, 6(1), 23. https://cisse.info/journal/index.php/cisse/ article/view/90

Zoto, E., Kianpour, M., Kowalski, S. J., & Lopez-Rojas, E. A. (2019). A socio-technical systems approach to design and support systems thinking in cybersecurity and risk management education. Complex Systems Informatics and Modeling Quarterly, 18, 65–75. https://doi.org/ 10.7250/csimq.2019-18.04 DOI: https://doi.org/10.7250/csimq.2019-18.04

Zou, Y., Le, K., Mayer, P., Acquisti, A., Aviv, A. J., & Schaub, F. (2024). Encouraging users to change breached passwords using the protection motivation theory. ACM Transactions on Computer-Human Interaction, 31(5), Article 63. https://doi.org/10.1145/3689432 DOI: https://doi.org/10.1145/3689432

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. DOI: https://doi.org/10.1080/08874417.2020.1712269

Downloads

Views

0

Downloads

0