Bulletin of Shakarim University Technical Sciences,
Journal Year:
2024,
Volume and Issue:
3(15), P. 5 - 15
Published: Sept. 27, 2024
In
today's
world,
where
digitalization
and
universal
connectivity
play
a
key
role,
cybersecurity
issues
are
coming
to
the
fore
in
context
of
global
security.
With
increasing
dependence
on
digital
technologies,
cyberspace
continues
evolve,
presenting
new
threats
challenges.
This
article
focuses
analysis
major
attacks
network
infrastructure
that
have
occurred
recent
years,
exploring
various
types
such
as
DDoS,
APT,
ransomware,
Man-in-the-Middle
(MitM)
SQL
Injection.
The
main
focus
is
identifying
common
attack
patterns
protection
techniques,
which
allows
for
better
understanding
mechanisms
strategies
countering
cyber
threats.
examines
detail
tools
methods
traffic
used
detect
neutralize
threats,
analyzes
their
effectiveness
real
conditions.
Using
included
histograms,
charts
tables,
visualizes
data
trends,
contributes
complexity
dynamics
attacks.
Based
analysis,
recommendations
formulated
improve
defense
develop
approaches
ensuring
security
critically
important
protecting
valuable
information
assets
maintaining
stability
cyberspace.
Sustainability,
Journal Year:
2023,
Volume and Issue:
15(19), P. 14327 - 14327
Published: Sept. 28, 2023
This
present
study
examines
how
work
overload
affects
cybersecurity
behavior,
considering
job
stress
as
a
mediator
and
corporate
ethics
moderator.
Using
time-lagged
survey
design,
377
South
Korean
employees
were
surveyed.
The
results
of
SEM
analysis
(structural
equation
model)
show
that
leads
to
higher
stress,
which
in
turn
worsens
behavior.
High
levels
buffer
this
negative
relationship.
research
fill
gaps
the
existing
literature
by
linking
overload,
offering
valuable
insights
for
both
theory
practice.
Future
directions
are
also
discussed.
Frontiers in Psychology,
Journal Year:
2024,
Volume and Issue:
15
Published: June 13, 2024
In
the
context
of
global
implementation
emission
peak
and
carbon-neutral
strategic
goal,
guiding
residents’
low-carbon
behavior
is
great
significance
for
realization
dual
carbon
goal.
However,
existing
studies
have
paid
less
attention
to
college
students.
Based
on
theory
planned
behavior,
this
paper
constructs
a
theoretical
model
influencing
factors
students’
behavior.
Combined
with
612
questionnaires
from
Chinese
colleges
universities,
study
uses
structural
equation
multi-group
analysis
method
explore
motivation
education
strategies.
The
results
show
that
attitude,
subjective
norms,
values,
perceived
control
significant
positive
effects
low
intention
students,
influence
their
through
intention.
Further
research
found
gender
growth
environment
(urban
vs.
rural)
presented
heterogeneity
in
different
paths,
cost
had
negative
moderating
effect
during
transition
These
findings
provide
basis
policy
inspiration
explaining
Information,
Journal Year:
2024,
Volume and Issue:
15(8), P. 505 - 505
Published: Aug. 21, 2024
Cybercrime
is
currently
rapidly
developing,
requiring
an
increased
demand
for
information
security
knowledge.
Attackers
are
becoming
more
sophisticated
and
complex
in
their
assault
tactics.
Employees
a
focal
point
since
humans
remain
the
‘weakest
link’
vital
to
prevention.
This
research
investigates
what
cognitive
internal
factors
influence
awareness
(ISA)
among
employees,
through
quantitative
empirical
using
survey
conducted
at
Dutch
financial
insurance
firm.
The
question
of
“How
extent
do
contribute
(ISA)?”
has
been
answered,
theory
situation
as
theoretical
lens.
constructs
Security
Complexity,
Information
Goals
(InfoSec
Goals),
SETA
Programs
(security
education,
training,
awareness)
significantly
ISA.
most
important
recommendations
seek
novel
explaining
variables
ISA,
further
investigate
roots
Complexity
influences
InfoSec
Goals,
venture
into
qualitative
experimental
methodologies
depth.
practical
minimize
complexity
(1)
topics
(e.g.,
by
contextualizing
it
specific
employee
groups)
(2)
integrate
these
simplifications
various
methods
gamification
online
training).
International Journal of Bank Marketing,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Nov. 16, 2024
Purpose
Drawing
on
protection
motivation
theory
(PMT),
this
study
aims
to
explore
the
factors
that
enhance
cybersecurity
awareness
among
online
banking
users
in
Malaysia.
More
specifically,
it
investigates
influences
of
perceived
vulnerability,
severity,
technical
knowledge,
privacy
intrusions
and
threats
then
examines
effects
threats,
along
with
response
efficacy
self-efficacy,
awareness,
considering
moderating
role
fear
cyberattacks.
Design/methodology/approach
A
survey-based
research
approach
was
applied,
hypotheses
were
tested
using
a
sample
324
respondents,
employing
partial
least
squares
structural
equation
modeling
(PLS-SEM).
Findings
The
results
show
significantly
influence
while
knowledge
does
not
threats.
Furthermore,
found
self-efficacy
both
have
no
it.
Finally,
our
confirmed
cyberattacks
relationship
between
awareness.
Practical
implications
For
individuals,
highlights
significance
fear,
shaping
perceptions,
paving
way
for
enhanced
tailored
programs.
Moreover,
understanding
relationships
empowers
individuals
craft
personalized
risk
mitigation
strategies,
fostering
confidence
navigating
digital
landscape.
Businesses
can
leverage
insights
informed
design
employee
training
programs
data-driven
decision-making
investments.
Government
entities,
recognizing
nuanced
are
encouraged
formulate
context-specific
policies
foster
cross-sector
collaboration
comprehensive
initiatives.
Originality/value
This
extends
PMT
by
incorporating
additional
antecedent
variables
–
namely,
within
context
been
overlooked
thus
far.
delves
into
unique
cyberattack
as
variable,
thereby
enhancing
PMT.
Globally,
Information
Communication
Technology
(ICT)
device
usage
has
seen
a
steep
rise
over
the
last
few
years.
This
also
holds
in
developing
countries,
which
have
embarked
on
connecting
unconnected
or
previously
disadvantaged
parts
of
their
populations.
connectivity
enables
people
to
interact
with
cyberspace,
brings
opportunities
and
challenges.
Opportunities
such
as
ability
conduct
business
online,
attend
online
education,
perform
banking
activities.
Challenges
experienced
are
cost
Internet
access
more
worrying
cyber-risks
potential
for
exploitation.
There
remain
pockets
communities
that
experience
sporadic
these
tend
be
susceptible
cyber-attacks
due
issues
lack/limited
awareness
cyber
secure
practices,
an
existent
culture
might
exploited
by
cybercriminals,
overall,
lackluster
approach
cyber-hygiene.
We
present
qualitative
study
conducted
rural
Northern
Namibia.
Our
findings
indicate
both
insecure
cybersecurity
practices
exist.
However,
through
Ubuntu
Uushiindaism
Afrocentric
lenses,
sharing
mobile
devices
without
passwords
among
community
mirror
unity.
Practices
this
mainstream
research
can
considered
insecure.
propose
interrogating
"common"
universality
applicability.
Scientific Bulletin,
Journal Year:
2024,
Volume and Issue:
29(1), P. 151 - 162
Published: June 1, 2024
Abstract
This
study
examines
the
growth
of
mobile
technology
usage
and
increasing
cybersecurity
threats
that
come
with
it,
over
3.8
billion
users
globally.
The
paper
reviews
existing
research
on
security,
highlighting
a
surge
in
incidents,
identifies
patterns,
user
behaviors,
technological
gaps
exacerbate
security
risks.
By
providing
more
nuanced
understanding
technology’s
challenges,
this
contributes
to
developing
effective
protection
strategies
ensure
users’
safety
digital
domain.