Article section
Assessing Information Security Awareness for a Tailored Intervention Program: A Study of Employees at Ifugao State University, Cordillera Administrative Region, Philippines
Abstract
Cybersecurity, especially information security, is a shared responsibility. Given that information is vital for any organization, this study was conducted to evaluate information security awareness (ISA) among the employees at Ifugao State University (IFSU) across its six campuses. It employed a quantitative approach, primarily using the descriptive research method. By utilizing a semi-structured questionnaire from the Human Aspects of Information Security Questionnaire (HAIS-Q), data were collected from the five hundred (n=500) employees and analyzed using statistical methods such as ANOVA, post-hoc tests, and independent t-tests. The findings revealed that IFSU employees generally exhibit moderate awareness of information security, with significant age-related differences but no notable differences based on sex or type of employee. Interestingly, both younger and older employees demonstrated inconsistent behaviors despite possessing sufficient knowledge and attitudes. To improve the ISA among IFSU employees, a customized, tailored, age-sensitive intervention program has been proposed.
Keywords:
Descriptive Survey Ifugao State University Information Security Awareness Knowledge-Attitude-Behavior Level
Article information
Journal
Journal of Arts, Humanities and Social Science
Volume (Issue)
2(3), (2025)
Pages
143-155
Published
Copyright
Copyright (c) 2025 Faith Joy A. Pugong (Author)
Open access

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Ahmad, M., Shari, A. M. J., Razali, R. R., & Sujak, A. F. A. (2023). Knowledge, attitude, and practices towards internet safety and security among Generation Z in Malaysia: A conceptual paper. In S. K. Bhar & H. Rahmat (Eds.), Proceedings of the International Conference on Communication, Language, Education and Social Sciences (CLESS 2022) (pp. 4–10). Atlantis Press. https://doi.org/10.2991/978-2-494069-61-9_2 DOI: https://doi.org/10.2991/978-2-494069-61-9_2
Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376
Alharthi, S., & Alghamdi, A. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136, 107376. https://doi.org/10.1016/j.chb.2022.107376 DOI: https://doi.org/10.1016/j.chb.2022.107376
AlMindeel, R., & Martins, J. T. (2021). Information security awareness in a developing country context: insights from the government sector in Saudi Arabia. Information Technology & People, 34(2), 770-788. DOI: https://doi.org/10.1108/ITP-06-2019-0269
Alotaibi, S., Alruban, A., Furnell, S., & Clarke, N. (2019). A novel behaviour profiling approach to continuous authentication for mobile applications. In Proceedings of the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019) (pp. 246–251). https://doi.org/10.5220/0007313302460251 DOI: https://doi.org/10.5220/0007313302460251
Alqahtani, H., & Kavakli-Thorne, M. (2020). Exploring factors affecting user's cybersecurity behaviour by using mobile augmented reality app (CybAR). In Proceedings of the 2020 12th International Conference on Computer and Automation Engineering (ICCAE 2020) (pp. 129–135). Association for Computing Machinery. https://doi.org/10.1145/3384613.3384629 DOI: https://doi.org/10.1145/3384613.3384629
Alshaikh, M. (2020). Developing cybersecurity culture to influence employee behavior: A practice perspective. Computers & Security, 98, 102003. https://doi.org/10.1016/j.cose.2020.102003 DOI: https://doi.org/10.1016/j.cose.2020.102003
Asiamah, N., Bempong, J. A., & Sghaier, M. (2024). Internet self-efficacy moderates the association of information technology ability with successful ageing among older employees in three African samples. European Journal of Ageing, 21, Article 31. https://doi.org/10.1007/s10433-024-00827-9 DOI: https://doi.org/10.1007/s10433-024-00827-9
Asker, H., & Tamtam, A. G. (2020). An investigation of the information security awareness and practices among third level education staff: Case study in Nalut, Libya. European Scientific Journal, 16(15), 20-32. DOI: https://doi.org/10.19044/esj.2020.v16n15p20
Assenza, G., Chittaro, A., De Maggio, M. C., Mastrapasqua, M., & Setola, R. (2020). A review of methods for evaluating security awareness initiatives. European Journal for Security Research, 5(2), 259-287. DOI: https://doi.org/10.1007/s41125-019-00052-x
Safa, N. S., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M., & Sookhak, M. (2019). Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Generation Computer Systems, 97, 587-597. DOI: https://doi.org/10.1016/j.future.2019.03.024
Bognár, L., & Bottyán, L. (2024). Evaluating online security behavior: Development and validation of a personal cybersecurity awareness scale for university students. Education Sciences, 14(6), 588. DOI: https://doi.org/10.3390/educsci14060588
Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2022). Exploring age and gender differences in ICT cybersecurity behaviour. Human Behavior and Emerging Technologies, 2022(1), Article 2693080. https://doi.org/10.1155/2022/2693080 DOI: https://doi.org/10.1155/2022/2693080
Busse, J., Busse, R., & Schumann, M. (2023). Does technology matter? How digital self-efficacy affects the relationship between ICT exposure and job dissatisfaction [Manuscript]. University of Göttingen. https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/0c9a24b0-3d43-42ff-b955-9c7471db1b1a/content
CELIS Institute. (2018, July 19). Data protection privacy policy
Check Point Cyber Security Report. (2022, May 21). Check Point Cyber Security Report: Global cyber pandemic’s magnitude revealed. Security Insight.
Cheng, D. (2021). Applicability of information governance for data privacy compliance in the education sector. DLSU Research Congress 2021. https://www.dlsu.edu.ph
Coffey, L. (2023). MOVEit signals growing cybersecurity threats for higher ed. Insiders Report. https://www.insidehighered.com
Connolly, L. Y., & Wall, D. S. (2019). The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Computers & Security, 87, 101568. DOI: https://doi.org/10.1016/j.cose.2019.101568
Corradini, I., & Nardelli, E. (2020). Developing digital awareness at school: A fundamental step for cybersecurity education. In Advances in Human Factors in Cybersecurity. Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-52581-1_14
CultureAI. (2024). Time to adapt: The state of human risk management in 2024.
CYFIRMA. (2023, October 9). Philippines threat overview. https://www.cyfirma.com
Dacanay, D. J. B., Quinto, M. S., Parayno, J. F., & Fajutagana, J. (2024). A comparative study of the Philippines in a global cybersecurity context and its implications on local cybersecurity practices. ResearchGate. https://www.researchgate.net/publication/380268096
Datta, P. M., & Nwankpa, J. K. (2023). Remote workers are more aware of cybersecurity risks than in-office employees: New study. ProQuest. https://www.proquest.com DOI: https://doi.org/10.64628/AAI.mxgh3tve7
Dawson, M., Wright, J., & Omar, M. (2015). Mobile devices: The case for cyber security hardened systems. In New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 8-29). IGI Global Scientific Publishing. DOI: https://doi.org/10.4018/978-1-4666-8345-7.ch002
De Maggio, M. C., Mastrapasqua, M., Tesei, M., Chittaro, A., & Setola, R. (2019). How to improve the security awareness in complex organizations. In International Conference on Applied Human Factors and Ergonomics. Springer. https://www.researchgate.net DOI: https://doi.org/10.1007/s41125-017-0028-2
Department of Information and Communication Technology. (2019, September 14). National ICT Household Survey Summary Report. https://dict.gov.ph
De Zan, T. (2019). Mind the gap: The cyber security skills shortage and public policy interventions. https://www.ctga.ox.ac.uk DOI: https://doi.org/10.4324/9780367822576-12
ENISA. (2019, May 7). ENISA threat landscape report 2018: 15 top cyber-threats and trends. Heraklion: European Network and Information Security Agency (ENISA).
Escobar, D. T. C. (2022). Cybersecurity Knowledge of The Cagayan State University Academic Community: Basis for Cybersecurity Policy. Journal of Positive School Psychology, 6(5).
Eydgahi, A., & Rajab, M. (2019). Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. Computers & Security, 80. DOI: https://doi.org/10.1016/j.cose.2018.09.016
Fadlika, R., Ruldeviyani, Y., Butarbutar, Z. T., Istiqomah, R. A., & Fariz, A. A. (2023). Employee information security awareness in the power generation sector of PT ABC. International Journal of Advanced Computer Science and Applications, 14(4), 594–601. DOI: https://doi.org/10.14569/IJACSA.2023.0140465
Fenelly, L., & Perry, M. (2020). Handbook of loss prevention and crime prevention (6th ed.). ScienceDirect. DOI: https://doi.org/10.1016/B978-0-12-817273-5.00005-3
Fernando, W. P. K., Dissanayake, D. A. N. P., Dushmantha, S. G. V. D., Liyanage, D. L. C. P., & Karunatilake, C. (2023). Challenges and opportunities in password management: a review of current solutions. Sri Lanka Journal of Social Sciences and Humanities, 3(2). DOI: https://doi.org/10.4038/sljssh.v3i2.96
Fertig, T., & Schütz, A. (2020). About the measuring of information security awareness: A systematic literature review. In Proceedings of the 53rd Hawaii International Conference on System Sciences. DOI: https://doi.org/10.24251/HICSS.2020.798
Flores, R., & Ching, M. (2018). Philippine SUCs compliance performance on RA 10173: A case study on Bukidnon State University. ACM International Conference Proceeding Series. https://www.dlsu.edu.ph DOI: https://doi.org/10.1145/3234781.3234790
Giwah, A. D., Wang, L., Levy, Y., & Hur, I. (2020). Empirical assessment of mobile device users’ information security behavior towards data breach: Leveraging protection motivation theory. Journal of Intellectual Capital, 21(2), 215–233. https://doi.org/10.1108/JIC-03-2019-0063 DOI: https://doi.org/10.1108/JIC-03-2019-0063
Glaspie, H. (2018). Assessment of information security culture in higher education (Electronic thesis No. 6009). University of Central Florida. https://stars.library.ucf.edu
Greig, J. (2023). University of Michigan severs ties to Internet after cyberattack. The Record.
Hadlington, L. (2017). Human factors in cybersecurity: Examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), e00346. https://doi.org/ 10.1016/j.heliyon.2017.e00346 DOI: https://doi.org/10.1016/j.heliyon.2017.e00346
Haeussinger, F., & Kranz, J. (2017). Antecedents of employees' information security awareness: Review, synthesis, and directions for future research. Association for Information Systems Electronic Library.
Hakkala, A., Isoaho, J., & Virtanen, S. (2018). Cyber security competence in working life. https://www.culture.ai/resources/reports/time-to-adapt-the-state-of-human-risk-management-in-2024
IFSU-MIS. (2023, December 29). Information management. https://mis.ifsu.edu.ph
Incident Report. (2024, June 8). What is incident reporting? https://www.incidentreport.net
Information Systems Audit and Control Association. (2023, October 2). ISACA’s state of cybersecurity 2023 report.
IPV Network. (2023, August 28). Riding the digital wave: Cybersecurity realities in the Philippines.
Al-Shanfari, I., Yassin, W., Tabook, N., Ismail, R., & Ismail, A. (2022). Determinants of information security awareness and behaviour strategies in public sector organizations among employees. International Journal of Advanced Computer Science and Applications, 13(8). DOI: https://doi.org/10.14569/IJACSA.2022.0130855
Jiow, H. J., Mwagwabi, F., & Low-Lim, A. (2021). Effectiveness of protection motivation theory based: Password hygiene training programme for youth media literacy education. Journal of Media Literacy Education, 13(1), 67–78. https://doi.org/10.23860/JMLE-2021-13-1-6 DOI: https://doi.org/10.23860/JMLE-2021-13-1-6
Khando, K., Gao, S., Islam, S. M., & Salman, A. (2021). Enhancing employees information security awareness in private and public organisations: A systematic literature review. Computers & security, 106, 102267. DOI: https://doi.org/10.1016/j.cose.2021.102267
Kont, K. (2023). Information security awareness of librarians in the Baltic countries: A comparative analysis. Baltic Journal of Modern Computing, 11(3), 450–474. https://www.researchgate.net DOI: https://doi.org/10.22364/bjmc.2023.11.3.07
Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13–24. DOI: https://doi.org/10.1016/j.ijinfomgt.2018.10.017
Li, W., Lee, J., Purl, J., Greitzer, F. L., Yousefi, B., & Laskey, K. B. (2020). Experimental investigation of demographic factors related to phishing susceptibility. 53rd Hawaii International Conference on System Sciences. DOI: https://doi.org/10.24251/HICSS.2020.274
Luevanos, C., Elizarraras, J., Hirschi, K., & Yeh, J. (2017). Analysis on the security and use of password managers. 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT). DOI: https://doi.org/10.1109/PDCAT.2017.00013
Mai, P., & Tick, A. (2021). Cyber security awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam. Acta Polytechnica Hungarica, 18, 67–89. https://doi.org/10.12700/APH.18.8.2021.8.4 https://acta.uni-obuda.hu/ Mai_Tick_115.pdf DOI: https://doi.org/10.12700/APH.18.8.2021.8.4
Manila Bulletin. (2020, June 19). PUP, FEU probe hacking of student portal.
Mbaka, W., & Tuma, K. (2024). Role of Gender in the Evaluation of Security Decisions. IEEE Security & Privacy, 22(2), 38-48. https://networkinstitute.org/2024/01/26/research-spotlight-gender-and-cybersecurity-decisions/ DOI: https://doi.org/10.1109/MSEC.2023.3343837
McCombes, S. (2019). Descriptive research. Scribbr.
Mimecast Limited. (2020, October 27). Mimecast research: Half of workers admit to opening emails they considered suspicious. GlobeNewswire. https://www.globenewswire.com/en/news-release/2020/10/27/2114887/0/en/Mimecast-Research-Half-of-Workers-Admit-to-Opening-Emails-They-Considered-Suspicious.html
Morgan, S. (2016). Cybersecurity business report. CSO.
National Cybersecurity Alliance & CybSafe. (2023). Oh behave! The annual cybersecurity attitudes and behaviors report 2023. https://staysafeonline.org/online-safety-privacy-basics/oh-behave/
National Privacy Commission. (2020, October 22). CID BN 19 067 in re University of the East resolution 2020.
News Channel 9. (2023, August 16). Cleveland City Schools hit by ransomware attack Tuesday, personal data not affected.
Ngo, M. (2021). Howard University hit by a ransomware attack. The New York Times.
Nguyen, B. H., & Le, H. N. Q. (2024). Investigation on information security awareness based on KAB model: the moderating role of age and education level. Information & Computer Security, 32(5), 598-612. https://doi.org/10.1108/ICS-09-2023-0152
Nguyen, T. D., & Le, D. H. (2024). Information security awareness in Vietnamese organizations: A KAB model approach. Information & Computer Security, 32(1), 89–110. https://doi.org/10.1108/ICS-09-2023-0152 DOI: https://doi.org/10.1108/ICS-09-2023-0152
Nicholson, J., Coventry, L., & Briggs, P. (2023). Cybersecurity personas for older adults. In Proceedings of the GoodIT '23: ACM International Conference on Information Technology for Social Good (pp. 1–7). Northumbria University. https://researchportal.northumbria.ac.uk/files/112884337/goodit23_55.pdf
Nugraha, A. C., Hidayanto, A. N., Indriany, H. S., Kurniati, H., Firdaus, B. M., & Bastara, A. (2022). Cybersecurity project implementation for resources protection: A case study of the National Narcotics Board. IOP Conference Series: Materials Science and Engineering. DOI: https://doi.org/10.1088/1755-1315/969/1/012061
Omar, S. Z., Kovalan, K., & Bolong, J. (2021). Effect of age on information security awareness level among young internet users in Malaysia. International Journal of Academic Research in Business and Social Sciences, 11(19), 245–255. https://doi.org/10.6007/IJARBSS/v11-i19/11733 DOI: https://doi.org/10.6007/IJARBSS/v11-i19/11733
Omorog, C. D., & Medina, R. P. (2017). Internet security awareness of Filipinos: A survey paper. arXiv. https://arxiv.org/abs/2012.03669
O’Flaherty, K. (2021). Breaking down five 2018 breaches and what they mean for security in 2019. Forbes.
Pacheco, E. (2024). Older adults’ safety and security online: A post-pandemic exploration of attitudes and behaviors. PhilArchive. https://philarchive.org/archive/PACOAS DOI: https://doi.org/10.31219/osf.io/58vqw_v1
Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Computers & Security, 66, 40-51. DOI: https://doi.org/10.1016/j.cose.2017.01.004
Paulsen, C., & Byers, R. (2019). Glossary of key information security terms (NIST Special Publication 800-114). National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114.pdf
Pearman, S., Zhang, S., Bauer, L., Christin, N., & Cranor, L. (2019). Why people (don’t) use password managers effectively. USENIX Proceedings of the Fifteenth Symposium on Usable Privacy and Security. Boise State UniversityScholarWorks. https://scholarworks.boisestate.edu/cs_fac_pubs/148/
Philippine Daily Inquirer. (2023, November 3). Cybersecurity awareness in PH needs improvement.
Philippine Institute for Development Studies. (2021, August 16). Did you know that awareness of cybersecurity and data privacy in PH is low?.
Philippine News Agency. (2024, April 30). Romblon State University assesses data breach after website hacking.
Pike, A. (2019). An evaluation of the information security awareness of university students. [Unpublished master's thesis].
Pollini, A., Callari, T., Tedeschi, A., Ruscio, D., Save, L., Chiarugi, F., & Guerri, D. (2021). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology and Work. Springer Nature. DOI: https://doi.org/10.1007/s10111-021-00683-y
Puspitaningrum, E. A., Devani, F. T., Putri, V. Q., & Hidayanto, A. N. (2018). Measurement of employee information security awareness: Case study at the Directorate General of Resources Management and Postal and Information Technology Equipment Ministry of Communications and Information Technology. Advances in Science, Technology, and Engineering Systems Journal, 5. https://www.researchgate.net DOI: https://doi.org/10.1109/IAC.2018.8780571
Quisumbing, L. (2019). Preemptive evaluation through information security awareness: Perception of information technology students in a Philippine State University.
Rahman, T., Rohan, R., Pal, D., & Kanthamanon, P. (2021). Human factors in cybersecurity: A scoping review. In The 12th International Conference on Advances in Information Technology. DOI: https://doi.org/10.1145/3468784.3468789
Rauf, U., Mohsen, F., & Wei, Z. (2023). A taxonomic classification of insider threats: Existing techniques, future directions & recommendations. Journal of Cyber Security and Mobility, 12(2), 221–252. https://doi.org/ 10.13052/jcsm2245-1439.1225 DOI: https://doi.org/10.13052/jcsm2245-1439.1225
Rohan, R., Pal, D., Hautamäki, J., Funilkul, S., Chutimaskul, W., & Thapliyal, H. (2023). A systematic literature review of cybersecurity scales assessing information security awareness. Heliyon, 9(3). DOI: https://doi.org/10.1016/j.heliyon.2023.e14234
Sari, P. K., Handayani, P. W., & Hidayanto, A. N. (2023). Demographic comparison of information security behavior toward health information system protection: Survey study. JMIR Formative Research, 7, e49439. https://doi.org/10.2196/49439 DOI: https://doi.org/10.2196/49439
Sarker, I. H. (2021). CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet of Things, 14, 100393. DOI: https://doi.org/10.1016/j.iot.2021.100393
Senthilkumar, K., & Easwaramoorthy, S. (2017). A survey on cyber security awareness among college students in Tamil Nadu. IOP Conference Series: Materials Science and Engineering, 263, 042043. DOI: https://doi.org/10.1088/1757-899X/263/4/042043
SHARP. (2017, January 9). Information security brochure (18644).
Shishkova, T. (2021). IT threat evolution in Q3 2021: Mobile statistics. Securelist.
Sommestad, T. (2018). Work-related groups and information security policy compliance. Information & Computer Security, 26. DOI: https://doi.org/10.1108/ICS-08-2017-0054
Spanning. (2018). Cybersecurity and risk awareness - Spanning report. https://spanning.com/resources/reports/trends-us-worker-cyber-risk-aversion-threat-preparedness/
Stanford University. (2024, March 11). Update on Department of Public Safety data security incident.
Sundaram, R., & Shetty, S. (2022). Privacy concerns and protection behavior during the Covid-19 pandemic. Problems and Perspectives in Management, 20(2), 57–70. http://dx.doi.org/10.21511/ppm.20(2).2022.06 DOI: https://doi.org/10.21511/ppm.20(2).2022.06
The Inquirer. (2017, November 11). Massive data breach has cost Equifax nearly $90 million.
ThreatDown. (2024, January 24). 2024 state of ransomware in education: 92% spike in K-12 attacks. ThreatDown Newsletter.
Tran, D. V., Nguyen, P. V., Vrontis, D., Nguyen, S. T. N., & Dinh, P. U. (2024). Unraveling influential factors shaping employee cybersecurity behaviors: An empirical investigation of public servants in Vietnam. Journal of Asia Business Studies, 18(6), 1445–1464. https://doi.org/10.1108/JABS-01-2024-0058 DOI: https://doi.org/10.1108/JABS-01-2024-0058
U.S. Department of Education. (2024, June 3). Data security: K-12 and higher education.
Umejiaku, A. P., Dhakal, P., & Sheng, V. S. (2023). Balancing password security and user convenience: Exploring the potential of prompt models for password generation. Electronics, 12(10), 2159. https://doi.org/ 10.3390/electronics12102159 DOI: https://doi.org/10.3390/electronics12102159
University of Arkansas. (2023, November 30). Phishing emails targeting university accounts.
University of Chicago. (2023). Digital studies M.A. and B.A./M.A. (DIGS) student manual 2023–2024. https://humanities.uchicago.edu/sites/default/files/DIGS%202023-2024%20Handbook_0.pdf
University of Michigan. (2023, August 23). August 2023 data incident.
Vaidya, R. (2022). Cyber security breaches survey 2019. Department for Digital, Culture, Media and Sport. DOI: https://doi.org/10.12968/S1361-3723(22)70568-4
Verizon's Data Breach. (2023, January 30). Data breach investigation report.
Wachtel, C. (2023). Industry study 2023: Employees ignore data handling guidelines. XPLM. https://www.xplm.com/news/press/industry-study-2023-employees-ignore-data-handling-guidelines/
Wash, R., & Rader, E. (2021). Prioritizing security over usability: Strategies for how people choose passwords. Journal of Cybersecurity, 7(1), tyab012. https://doi.org/10.1093/cybsec/tyab012 DOI: https://doi.org/10.1093/cybsec/tyab012
Washington Technology Solutions. (2024, January). Information security awareness. Office of Cybersecurity, State of Washington. https://watech.wa.gov/information-security-awareness-january-2024
Yerby, J., & Floyd, K. (2018). Faculty and staff information security awareness and behaviors. Journal of The Colloquium for Information Systems Security Education, 6(1), 23. https://cisse.info/journal/index.php/cisse/ article/view/90
Zoto, E., Kianpour, M., Kowalski, S. J., & Lopez-Rojas, E. A. (2019). A socio-technical systems approach to design and support systems thinking in cybersecurity and risk management education. Complex Systems Informatics and Modeling Quarterly, 18, 65–75. https://doi.org/ 10.7250/csimq.2019-18.04 DOI: https://doi.org/10.7250/csimq.2019-18.04
Zou, Y., Le, K., Mayer, P., Acquisti, A., Aviv, A. J., & Schaub, F. (2024). Encouraging users to change breached passwords using the protection motivation theory. ACM Transactions on Computer-Human Interaction, 31(5), Article 63. https://doi.org/10.1145/3689432 DOI: https://doi.org/10.1145/3689432
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. DOI: https://doi.org/10.1080/08874417.2020.1712269
Stecab Publishing

Call for Papers
Author's Guidelines
Manuscript Template
References Guideline