Gardenia et al., 2025 - Google Patents
Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model.Gardenia et al., 2025
- Document ID
- 1249002453039317376
- Author
- Gardenia Y
- Gani A
- Publication year
- Publication venue
- EAI Endorsed Transactions on Scalable Information Systems
External Links
Snippet
This era of revolution has influenced all sectors of society, including education, where technological advancements are now integral to online teaching and learning. However, not everyone fully understands the potential negative impacts of internet usage. The purpose of …
- 238000000034 method 0 title description 17
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Crossler et al. | The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats | |
| Chard et al. | Auditing large language models for privacy compliance with specially crafted prompts | |
| Ncubukezi | Human errors: A cybersecurity concern and the weakest link to small businesses | |
| Jeyaraj et al. | Institutional isomorphism in organizational cybersecurity: A text analytics approach | |
| Wahyudiwan et al. | Information security awareness level measurement for employee: Case study at ministry of research, technology, and higher education | |
| Khan et al. | Security risks of global software development life cycle: Industry practitioner's perspective | |
| Alzahrani | Statistical analysis of cybersecurity awareness issues in higher education institutes | |
| Gardenia et al. | Cybersecurity Awareness Model with Methods: Analytical Hierarchy Process and Structural Equation Model. | |
| Chu et al. | Developing a typological theory using a quantitative approach: A case of information security deviant behavior | |
| Fakeh et al. | Information security awareness amongst academic librarians | |
| Taylor et al. | A tutorial in assessing disclosure risk in microdata | |
| Dean et al. | Data mining: an ethical baseline for online privacy policies | |
| Ugwu et al. | A study on the impact of gender, employment status, and academic discipline on cyber-hygiene: A case study of University of Nigeria, Nsukka | |
| Styoutomo et al. | Information security awareness raising strategy using fuzzy ahp method with hais-q and iso/iec 27001: 2013: A case study of xyz financial institution | |
| Islam et al. | Human factors in software security risk management | |
| Addae et al. | Factors influencing information security policy compliance behavior | |
| Blake et al. | Analyzing information systems security research to find key topics, trends, and opportunities | |
| Yeboah-Boateng | Using fuzzy cognitive maps (FCMs) To evaluate the vulnerabilities with ICT assets disposal policies | |
| Cyoy | Framework for Effective Management of Cyber Security on E-learning Platforms in Public Universities in Kenya | |
| AlEroud et al. | Identifying GDPR privacy violations using an augmented LSTM: toward an AI-based violation alert systems | |
| Salitin et al. | Evaluation criteria for network security solutions based on behaviour analytics | |
| Li | Impact assessment of cybersecurity awareness training: Moderating effects of age, gender, and education level | |
| Obeidat et al. | Implementing Factors of Information Security in Governmental Organizations of Jordan | |
| Black et al. | Values and trends in cybersecurity | |
| Smith et al. | A Doubled-Edged Sword Called Cyberspace: Introducing the Concept of Cybercrime |