Bulletin of Shakarim University Technical Sciences,
Journal Year:
2024,
Volume and Issue:
3(15), P. 5 - 15
Published: Sept. 27, 2024
In
today's
world,
where
digitalization
and
universal
connectivity
play
a
key
role,
cybersecurity
issues
are
coming
to
the
fore
in
context
of
global
security.
With
increasing
dependence
on
digital
technologies,
cyberspace
continues
evolve,
presenting
new
threats
challenges.
This
article
focuses
analysis
major
attacks
network
infrastructure
that
have
occurred
recent
years,
exploring
various
types
such
as
DDoS,
APT,
ransomware,
Man-in-the-Middle
(MitM)
SQL
Injection.
The
main
focus
is
identifying
common
attack
patterns
protection
techniques,
which
allows
for
better
understanding
mechanisms
strategies
countering
cyber
threats.
examines
detail
tools
methods
traffic
used
detect
neutralize
threats,
analyzes
their
effectiveness
real
conditions.
Using
included
histograms,
charts
tables,
visualizes
data
trends,
contributes
complexity
dynamics
attacks.
Based
analysis,
recommendations
formulated
improve
defense
develop
approaches
ensuring
security
critically
important
protecting
valuable
information
assets
maintaining
stability
cyberspace.
IEEE Transactions on Engineering Management,
Journal Year:
2023,
Volume and Issue:
71, P. 10232 - 10244
Published: Aug. 2, 2023
Studies
on
Chatbot
adoption
are
gaining
traction
across
different
fields.
Previous
studies
have
outlined
several
drivers
of
through
the
lenses
various
technology
theories.
However,
these
not
been
thoroughly
reviewed
and
synthesized.
Therefore,
this
article
aims
to
analyze
theories,
antecedents,
moderators,
domains,
methodologies,
participants
a
multiperspective
viewpoint.
Out
3942
collected,
219
were
analyzed.
The
main
findings
indicated
that
acceptance
model,
social
presence
theory,
computers
actors
dominant
theories
in
explaining
adoption.
Most
focused
examining
usage
intention
Chatbots,
with
limited
investigations
actual
use
continuous
intention.
Nearly
63%
analyzed
did
employ
those
tend
do
so
most
frequently
gender,
Chatbot/technical
experience,
age.
This
presents
fresh
viewpoint
deepens
our
understanding
proposes
agendas
for
future
research.
agenda
incorporates
research
directions
Chatbots
general
generative
artificial
intelligence
specific.
It
also
offers
theoretical
contributions
provides
relevant
information
developers,
decision-makers,
practitioners,
IT
vendors,
policymakers.
Amidst
growing
IT
security
challenges,
psychological
underpinnings
of
behaviors
have
received
considerable
interest,
e.g.
cybersecurity
Self-Efficacy
(SE),
the
belief
in
one's
own
ability
to
enact
cybersecurity-related
skills.
Due
diverging
definitions
and
proposed
mechanisms,
research
methods
this
field
vary
considerably,
potentially
impeding
replicable
evidence
meaningful
synthesis.
We
report
a
preregistered
systematic
literature
review
investigating
(a)
SE
measures,
(b)
SE's
roles,
(c)
intervention
approaches.
minimized
selection
bias
by
detailed
exclusion
criteria,
interdisciplinary
search
strategy,
double
coding.
Among
174
studies
(2010-2021)
from
18
databases
with
55,758
subjects,
we
identified
173
different
measures
differences
psychometric
quality
validity
evidence.
found
276
variables
as
assumed
causes/outcomes
13
designs.
This
demonstrates
extent
methodological
conceptual
fragmentation
research.
offer
recommendations
inspire
our
community
toward
standardization.
Information,
Journal Year:
2024,
Volume and Issue:
15(10), P. 619 - 619
Published: Oct. 10, 2024
This
review
addresses
the
fragmented
literature
on
administrative
interventions
for
cybercrime
mitigation
within
e-government
services,
which
often
prioritise
technological
aspects
over
a
unified
theoretical
framework.
By
analysing
32
peer-reviewed
articles
from
Web
of
Science
(WoS)
and
Scopus
databases,
supplemented
by
additional
sources
located
through
Google
Scholar,
this
study
synthesises
factors
technical,
managerial
behavioural
domains
using
Theory,
Context
Method
(TCM)
The
findings
reveal
predominant
focus
technical
factors,
with
frequently
overlooked.
Cybercrime
is
treated
as
procedural
step
rather
than
holistic
process.
advocates
well-established,
context-specific
plan,
integrating
regional
Human–Organisation–Technology
(HOT)
framework
to
develop
comprehensive
model
effective
in
services.
research
has
practical,
policy
implications,
offering
actionable
insights
improving
operational
practices,
advancing
frameworks
guiding
policymakers
formulating
strategies.
Online Information Review,
Journal Year:
2025,
Volume and Issue:
unknown
Published: Feb. 27, 2025
Purpose
The
Metaverse
holds
vast
amounts
of
user
data,
making
it
essential
to
address
threats
its
confidentiality,
integrity
and
availability.
These
are
not
purely
technological,
as
actions
perceptions,
shaped
by
psychological
factors,
can
influence
cybersecurity
challenges.
Thus,
a
holistic
approach
incorporating
technological
dimensions
is
crucial
for
safeguarding
data
security
privacy.
This
research
explores
users’
behavior
in
the
integrating
technology
threat
avoidance
theory
(TTAT)
planned
(TPB).
Design/methodology/approach
model
was
assessed
using
collected
from
746
users.
empirical
were
analyzed
dual
structural
equation
modeling-artificial
neural
network
(SEM-ANN)
approach.
Findings
main
PLS-SEM
findings
indicated
that
significantly
affected
attitude,
perceived
behavioral
control,
subjective
norms,
motivation.
ANN
results
showed
with
normalized
importance
100%
most
significant
factor
influencing
behavior.
also
severity
98.79%
impacts
threat.
Originality/value
novelty
this
stems
developing
unified
grounded
TTAT
TPB
understand
behaviors
Metaverse.
Unlike
previous
studies
solely
focused
on
measuring
intentions
or
behaviors,
study
takes
step
further
evaluating
behaviors.
Alongside
theoretical
insights,
offers
practical
recommendations
software
developers,
decision-makers
service
providers.
Big Data and Cognitive Computing,
Journal Year:
2024,
Volume and Issue:
8(4), P. 37 - 37
Published: March 29, 2024
A
critical
worldwide
problem
is
that
ransomware
cyberattacks
can
be
costly
to
organizations.
Moreover,
accidental
employee
cybercrime
risk
challenging
prevent,
even
by
leveraging
advanced
computer
science
techniques.
This
exploratory
project
used
a
novel
cognitive
computing
design
with
detailed
explanations
of
the
action-research
case-study
methodology
and
customized
machine
learning
(ML)
techniques,
supplemented
workflow
diagram.
The
ML
techniques
included
language
preprocessing,
normalization,
tokenization,
keyword
association
analytics,
tree
analysis,
credibility/reliability/validity
checks,
heatmaps,
scatter
plots.
author
analyzed
over
8
GB
behavior
big
data
from
multinational
Fintech
company
global
intranet.
five-factor
personality
theory
(FFPT)
psychology
discipline
was
integrated
into
semi-supervised
classify
retrospective
then
identify
risk.
Higher
levels
neuroticism
were
associated
greater
organizational
risk,
corroborating
findings
in
empirical
publications.
In
stark
contrast
literature,
an
openness
new
experiences
inversely
related
other
FFPT
factors,
conscientiousness,
agreeableness,
extroversion,
had
no
informative
study
introduced
interdisciplinary
paradigm
shift
for
illustrating
how
integrate
proven
scientific
construct
ML—personality
discipline—to
analyze
human
using
collection
approach
asserted
more
efficient,
reliable,
valid
as
compared
traditional
methods
like
surveys
or
interviews.