+

Gardenia et al., 2025 - Google Patents

Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model.

Gardenia et al., 2025

Document ID
1249002453039317376
Author
Gardenia Y
Gani A
Publication year
Publication venue
EAI Endorsed Transactions on Scalable Information Systems

External Links

Snippet

This era of revolution has influenced all sectors of society, including education, where technological advancements are now integral to online teaching and learning. However, not everyone fully understands the potential negative impacts of internet usage. The purpose of …
Continue reading at search.ebscohost.com (other versions)

Similar Documents

Publication Publication Date Title
Crossler et al. The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
Chard et al. Auditing large language models for privacy compliance with specially crafted prompts
Ncubukezi Human errors: A cybersecurity concern and the weakest link to small businesses
Jeyaraj et al. Institutional isomorphism in organizational cybersecurity: A text analytics approach
Wahyudiwan et al. Information security awareness level measurement for employee: Case study at ministry of research, technology, and higher education
Khan et al. Security risks of global software development life cycle: Industry practitioner's perspective
Alzahrani Statistical analysis of cybersecurity awareness issues in higher education institutes
Gardenia et al. Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model.
Chu et al. Developing a typological theory using a quantitative approach: A case of information security deviant behavior
Fakeh et al. Information security awareness amongst academic librarians
Taylor et al. A tutorial in assessing disclosure risk in microdata
Dean et al. Data mining: an ethical baseline for online privacy policies
Ugwu et al. A study on the impact of gender, employment status, and academic discipline on cyber-hygiene: A case study of University of Nigeria, Nsukka
Styoutomo et al. Information security awareness raising strategy using fuzzy ahp method with hais-q and iso/iec 27001: 2013: A case study of xyz financial institution
Islam et al. Human factors in software security risk management
Addae et al. Factors influencing information security policy compliance behavior
Blake et al. Analyzing information systems security research to find key topics, trends, and opportunities
Yeboah-Boateng Using fuzzy cognitive maps (FCMs) To evaluate the vulnerabilities with ICT assets disposal policies
Cyoy Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya
AlEroud et al. Identifying GDPR privacy violations using an augmented LSTM: toward an AI-based violation alert systems
Salitin et al. Evaluation criteria for network security solutions based on behaviour analytics
Li Impact assessment of cybersecurity awareness training: Moderating effects of age, gender, and education level
Obeidat et al. Implementing Factors of Information Security in Governmental Organizations of Jordan
Black et al. Values and trends in cybersecurity
Smith et al. A Doubled-Edged Sword Called Cyberspace: Introducing the Concept of Cybercrime
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载