ENSURING A SAFE TOMORROW: CONCLUSIONS FROM THE ANALYSIS OF THE LEADING CYBER ATTACKS AND THEIR IMPACT ON INFORMATION SECURITY DOI

A. R. Yerboluly,

T. K. Tusipova

Bulletin of Shakarim University Technical Sciences, Journal Year: 2024, Volume and Issue: 3(15), P. 5 - 15

Published: Sept. 27, 2024

In today's world, where digitalization and universal connectivity play a key role, cybersecurity issues are coming to the fore in context of global security. With increasing dependence on digital technologies, cyberspace continues evolve, presenting new threats challenges. This article focuses analysis major attacks network infrastructure that have occurred recent years, exploring various types such as DDoS, APT, ransomware, Man-in-the-Middle (MitM) SQL Injection. The main focus is identifying common attack patterns protection techniques, which allows for better understanding mechanisms strategies countering cyber threats. examines detail tools methods traffic used detect neutralize threats, analyzes their effectiveness real conditions. Using included histograms, charts tables, visualizes data trends, contributes complexity dynamics attacks. Based analysis, recommendations formulated improve defense develop approaches ensuring security critically important protecting valuable information assets maintaining stability cyberspace.

Language: Английский

Chatbot Adoption: A Multiperspective Systematic Review and Future Research Agenda DOI
Abdulla M. Alsharhan, Mostafa Al‐Emran, Khaled Shaalan

et al.

IEEE Transactions on Engineering Management, Journal Year: 2023, Volume and Issue: 71, P. 10232 - 10244

Published: Aug. 2, 2023

Studies on Chatbot adoption are gaining traction across different fields. Previous studies have outlined several drivers of through the lenses various technology theories. However, these not been thoroughly reviewed and synthesized. Therefore, this article aims to analyze theories, antecedents, moderators, domains, methodologies, participants a multiperspective viewpoint. Out 3942 collected, 219 were analyzed. The main findings indicated that acceptance model, social presence theory, computers actors dominant theories in explaining adoption. Most focused examining usage intention Chatbots, with limited investigations actual use continuous intention. Nearly 63% analyzed did employ those tend do so most frequently gender, Chatbot/technical experience, age. This presents fresh viewpoint deepens our understanding proposes agendas for future research. agenda incorporates research directions Chatbots general generative artificial intelligence specific. It also offers theoretical contributions provides relevant information developers, decision-makers, practitioners, IT vendors, policymakers.

Language: Английский

Citations

26

Understanding users' protective behavior and its suppressor effect on the perceived risk in M-wallet/banking use: An Indian urban-rural comparison DOI
Vikas Chauhan

Technological Forecasting and Social Change, Journal Year: 2024, Volume and Issue: 201, P. 123255 - 123255

Published: Feb. 19, 2024

Language: Английский

Citations

8

Evaluating the barriers affecting cybersecurity behavior in the Metaverse using PLS-SEM and fuzzy sets (fsQCA) DOI
Mostafa Al‐Emran, Mohammed A. Al‐Sharafi, Behzad Foroughi

et al.

Computers in Human Behavior, Journal Year: 2024, Volume and Issue: 159, P. 108315 - 108315

Published: May 29, 2024

Language: Английский

Citations

7

Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods DOI Creative Commons
Nele Borgert, Luisa Jansen,

Imke Böse

et al.

Published: May 11, 2024

Amidst growing IT security challenges, psychological underpinnings of behaviors have received considerable interest, e.g. cybersecurity Self-Efficacy (SE), the belief in one's own ability to enact cybersecurity-related skills. Due diverging definitions and proposed mechanisms, research methods this field vary considerably, potentially impeding replicable evidence meaningful synthesis. We report a preregistered systematic literature review investigating (a) SE measures, (b) SE's roles, (c) intervention approaches. minimized selection bias by detailed exclusion criteria, interdisciplinary search strategy, double coding. Among 174 studies (2010-2021) from 18 databases with 55,758 subjects, we identified 173 different measures differences psychometric quality validity evidence. found 276 variables as assumed causes/outcomes 13 designs. This demonstrates extent methodological conceptual fragmentation research. offer recommendations inspire our community toward standardization.

Language: Английский

Citations

4

Critical Factors and Practices in Mitigating Cybercrimes within E-Government Services: A Rapid Review on Optimising Public Service Management DOI Creative Commons
Shahrukh Mushtaq, Mahmood Shah

Information, Journal Year: 2024, Volume and Issue: 15(10), P. 619 - 619

Published: Oct. 10, 2024

This review addresses the fragmented literature on administrative interventions for cybercrime mitigation within e-government services, which often prioritise technological aspects over a unified theoretical framework. By analysing 32 peer-reviewed articles from Web of Science (WoS) and Scopus databases, supplemented by additional sources located through Google Scholar, this study synthesises factors technical, managerial behavioural domains using Theory, Context Method (TCM) The findings reveal predominant focus technical factors, with frequently overlooked. Cybercrime is treated as procedural step rather than holistic process. advocates well-established, context-specific plan, integrating regional Human–Organisation–Technology (HOT) framework to develop comprehensive model effective in services. research has practical, policy implications, offering actionable insights improving operational practices, advancing frameworks guiding policymakers formulating strategies.

Language: Английский

Citations

4

Assessing Cybersecurity Awareness Among Bank Employees: A Multi-Stage Analytical Approach Using PLS-SEM, ANN, and fsQCA in a Developing Country Context DOI
Razib Chandra Chanda, Ali Vafaei-Zadeh, Haniruzila Hanifah

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: 149, P. 104208 - 104208

Published: Nov. 12, 2024

Language: Английский

Citations

4

Predicting cybersecurity behaviors in the metaverse through the lenses of TTAT and TPB: a hybrid SEM-ANN approach DOI
Rawan A. Alsharida, Bander Ali Saleh Al-rimy, Mostafa Al‐Emran

et al.

Online Information Review, Journal Year: 2025, Volume and Issue: unknown

Published: Feb. 27, 2025

Purpose The Metaverse holds vast amounts of user data, making it essential to address threats its confidentiality, integrity and availability. These are not purely technological, as actions perceptions, shaped by psychological factors, can influence cybersecurity challenges. Thus, a holistic approach incorporating technological dimensions is crucial for safeguarding data security privacy. This research explores users’ behavior in the integrating technology threat avoidance theory (TTAT) planned (TPB). Design/methodology/approach model was assessed using collected from 746 users. empirical were analyzed dual structural equation modeling-artificial neural network (SEM-ANN) approach. Findings main PLS-SEM findings indicated that significantly affected attitude, perceived behavioral control, subjective norms, motivation. ANN results showed with normalized importance 100% most significant factor influencing behavior. also severity 98.79% impacts threat. Originality/value novelty this stems developing unified grounded TTAT TPB understand behaviors Metaverse. Unlike previous studies solely focused on measuring intentions or behaviors, study takes step further evaluating behaviors. Alongside theoretical insights, offers practical recommendations software developers, decision-makers service providers.

Language: Английский

Citations

0

An Integrated SEM-ANN Approach to Evaluating Cybersecurity Behaviors in the Metaverse DOI
Rawan A. Alsharida, Bander Ali Saleh Al‐rimy, Mostafa Al‐Emran

et al.

International Journal of Human-Computer Interaction, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 20

Published: April 7, 2025

Language: Английский

Citations

0

Research on the Mechanism for Enhancing Undergraduate Students' Information Security Behavior in the Context of Generative Artificial Intelligence DOI
Yuhua Cao

Published: Jan. 17, 2025

Language: Английский

Citations

0

Cybercrime Risk Found in Employee Behavior Big Data Using Semi-Supervised Machine Learning with Personality Theories DOI Creative Commons
Kenneth David Strang

Big Data and Cognitive Computing, Journal Year: 2024, Volume and Issue: 8(4), P. 37 - 37

Published: March 29, 2024

A critical worldwide problem is that ransomware cyberattacks can be costly to organizations. Moreover, accidental employee cybercrime risk challenging prevent, even by leveraging advanced computer science techniques. This exploratory project used a novel cognitive computing design with detailed explanations of the action-research case-study methodology and customized machine learning (ML) techniques, supplemented workflow diagram. The ML techniques included language preprocessing, normalization, tokenization, keyword association analytics, tree analysis, credibility/reliability/validity checks, heatmaps, scatter plots. author analyzed over 8 GB behavior big data from multinational Fintech company global intranet. five-factor personality theory (FFPT) psychology discipline was integrated into semi-supervised classify retrospective then identify risk. Higher levels neuroticism were associated greater organizational risk, corroborating findings in empirical publications. In stark contrast literature, an openness new experiences inversely related other FFPT factors, conscientiousness, agreeableness, extroversion, had no informative study introduced interdisciplinary paradigm shift for illustrating how integrate proven scientific construct ML—personality discipline—to analyze human using collection approach asserted more efficient, reliable, valid as compared traditional methods like surveys or interviews.

Language: Английский

Citations

3