english

Migration from traditional Social Network to Anonymous Social Network

Even though social network sites (SNS) are still popular, more and more young users are abandoning traditional social network sites. In 2018, less than half of people aged 12–17 used Facebook monthly.  These changes can be attributed to the fact that young users are looking for other options such as Anonymous Social network (ASNS) platforms …

Gender differences in privacy tendencies on social network platforms

Due to the public grown awareness and concerns over privacy, social networking services have enhanced their privacy setting options. However, these enhancements and changes are not always easy to follow or implement, and many people do not use them to their full potential. For users of social networking platforms, too much privacy will limit self-presentation. …

Relationship between culture and Information Security Awareness

When it comes to cybersecurity, it is important to consider human behaviour as a part of a group as individuals play a significant role in creating and preventing incidents. Culture and interactions in work environments can participate in determining human behaviour. Information Security Awareness (ISA) is essential for organizations, primarily to mitigate risks.  ISA refers …

Smartphone user’s security awareness and education

Smartphone features and usage have changed significantly over the past few years. The increasing amount of personal and private data on those devices makes them a popular target for theft. There have been several studies on smartphone user’s awareness and concerns regarding security. Some studies have revealed that due to a low level of security …

Threat-occurrence predictive models to improve information security risk analysis

The information and communication technologies are essential resources for organizations nowadays, and, with vast amounts of information circulating every day, protection becomes a priority. Various methodologies of information security risk analysis study and evaluate the security measures used to protect data. Traditional methods base their risk calculations on historical data, using threat- occurrence frequency as …

Perceived security risk and intention to use smart home devices

Numerous and various interconnected Internet of Things (IoT) devices continue to increase on the market. Smart home devices are marketed as providing multiple benefits to make consumers’ life more manageable and, as such, are a significant part of the loT consumer market. Media and researchers have raised questions about the security of smart home technology, …