Examining the Impact Factors Influencing Higher Education Institution (HEI) Students’ Security Behaviours in Cyberspace Environment
DOI: http://dx.doi.org/10.62527/joiv.9.1.2296
Abstract
Keywords
Full Text:
PDFReferences
Kathrine, G. J. W., Praise, P. M., Rose, A. A., & Kalaivani, E. C. (2019, April). Variants of phishing attacks and their detection techniques. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 255-259). IEEE.
AAG-IT. (2023). The Latest 2023 Phishing Statistics (updated July 2023), https://aag-it.com/the-latest-phishing-statistics/.
Aleesa, A. M., Alabdulqader, E., & Kakkattil, R. (2019). Anti-Phishing Tools and Techniques: A Review. International Journal of Computer Science and Information Security, 17(7), 106-115.
Cai, Q., Li, H., & Wang, Q. (2021). Machine Learning-Based Phishing Email Detection: A Review. IEEE Access, 9, 26233-26247.
Wang, H., Jiang, J., & Zhang, Z. (2021). Emerging Trends in Phishing Attacks: Mobile Phishing and Social Media-Based Phishing. Future Internet, 13(2), 26.
Smith, J. (2019). Phishing attacks: Methods and targets. Journal of Cybersecurity, 5(2), 123-137.
Sahu, M. K., & Shrivastava, R. (2022). An analysis of phishing attacks and preventive measures in educational institutions. Computers & Security, 120, 102803. https://doi.org/10.1016/j.cose.2022.102803.
Makridis, C., & Weber, M. (2021). Behavioral responses to cybersecurity attacks. Cybersecurity Policy Review, 4(3), 198–215.
Alshammari, F., et al. (2023). Phishing Awareness Campaigns: Do They Work? IEEE Transactions on Human-Machine Systems, 53(2), 159–172.
Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In Emerging cyber threats and cognitive vulnerabilities (pp. 73-92). Academic Press.
Dodel, M., & Mesch, G. (2017). Cyber-victimization preventive behaviour: A health belief model approach. Computers in Human Behaviour, 68, 359–367. https://doi.org/10.1016/j.chb.2016.11.044
Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 744 (2018)
Boskey, E. (2022, October 13). The health belief model. Verywellmind. https://www.verywellmind.com/health-belief-model-3132721
Kovacevic, A., Putnik, N., & Toskovic, O. (2020). Factors Related to Cyber Security Behaviour. IEEE Access, 8, 125140–125148. https://doi.org/10.1109/access.2020.3007867
Hinduja, S., & Patchin, J. W. (2019). Connecting adolescent suicide to the severity of bullying and cyberbullying. Journal of school violence, 18(3), 333-346.
Gupta, S. S., Thakral, A., & Choudhury, T. (2018, June). Social media security analysis of threats and security measures. In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE) (pp. 115-120). IEEE.
Tawalbeh, L., et al. (2022). Cybersecurity in cloud environments: A review of advanced threat detection techniques. Future Generation Computer Systems, 133, 60–80.
Alotaibi, N. M., Alajmi, H. A., & Alawwad, A. (2021). The Role of Organizational Support in Cybersecurity Compliance Behaviour among University Students: An Empirical Investigation. Journal of Information Privacy and Security.
Raman, S., & Singh, R. (2023). Human-centric cybersecurity: Understanding susceptibility in higher education students. Journal of Information Privacy and Security, 19(4), 202–217.
E.J.Williams, J.Hinds, & A,N.Joinson, “Exploring susceptibility to phishing in the workplace,”International Journal of Human Computer Studies, 120, pp.1–13,2018. https://doi.org/10.1016/j.ijhcs.2018.06.004
K. Edwards, "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users," CCE Theses and Dissertations, 2015. [Online]. Available: https://nsuworks.nova.edu/gscis_etd/947.
J. N. Al-Karaki, A. Gawanmeh, and C. Fachkha, "Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks," 2023 5th International Conference on Blockchain Computing and Applications (BCCA), pp. 404-411, 2023.
P. Sharma, B. Dash, and M. F. Ansari, "Anti-Phishing Techniques – A Review of Cyber Defense Mechanisms," IJARCCE, vol. 11, no. 7, pp. 106-115, 2022
M. F. Ansari, P. K. Sharma, and B. Dash, "Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training," International Journal of Smart Sensors and Ad Hoc Networks, vol. 3, no. 3, 2022.
M. Almseidin, A. Zuraig, M. Al-Kasassbeh, and N. Alnidami, "Phishing Detection Based on Machine Learning and Feature Selection Methods," International Journal of Interactive Mobile Technologies, vol. 14, no. 15, pp. 171-183, 2019.
I. Bose, and A. C. M. Leung, "Assessing anti-phishing preparedness: A study of online banks in Hong Kong," Decision Support Systems, vol. 45, no. 4, pp. 897-912, 2008.
Zhang, Y., & Zhou, L. (2023). Exploring machine learning approaches for detecting and preventing phishing scams. Computers & Security, 121, 102841.
E. Benavides, W. Fuertes, S. Sanchez, and D. Nuñez-Agurto, "Characterization of Phishing Attacks and Techniques to Mitigate These Attacks: A Systematic Review of The Literature," IEEE Access, vol. 8, pp. 125140-125148, 2020.
Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, "Phishing Attacks: A Recent Comprehensive Study and a New Anatomy," Frontiers in Computer Science, vol. 3, p. 563060, 2021.
M. N. Willie, "The Role of Organizational Culture in Cybersecurity: Building a Security-First Culture," Journal of Research, Innovation and Technologies (JoRIT), vol. 2, no. 16, p. 180, 2023.
Benavides, E., et al. (2020). Advances in phishing detection using deep learning models. IEEE Access, 8, 125140–125148.
R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd ed., Wiley, 2020.
Al-Fuqaha, A., et al. (2023). Cybersecurity in the IoT Era: Exploring security behaviors among higher education students. Journal of Cybersecurity and Privacy, 3(3), 1–22.
E. Williams, J. Hinds, and A. N. Joinson, "Exploring susceptibility to phishing in the workplace," International Journal of Human Computer Studies, vol. 120, pp. 1-13, 2018.