Citizens' Cybersecurity Behavior Some Major Challenges

被引:5
作者
Li, Ying [1 ]
Xin, Tong [2 ]
Siponen, Mikko [3 ]
机构
[1] Dalian Univ Technol, Sch Econ & Management, Dalian 116024, Liaoning, Peoples R China
[2] Univ Jyvaskyla, Fac Informat Technol, Jyvaskyla, Finland
[3] Univ Jyvaskyla, Informat Syst, Jyvaskyla 40100, Finland
关键词
Computer security; Computers; Internet; Knowledge engineering; Organizations; Security; Training;
D O I
10.1109/MSEC.2021.3117371
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Citizens' cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research.
引用
收藏
页码:54 / 61
页数:8
相关论文
共 14 条
  • [1] [Anonymous], 2020, SAFEATLAST
  • [2] [Anonymous], 2020, CYB REM WORK ER GLOB
  • [3] Gender difference and employees' cybersecurity behaviors
    Anwar, Mohd
    He, Wu
    Ash, Ivan
    Yuan, Xiaohong
    Li, Ling
    Xu, Li
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 : 437 - 443
  • [4] The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?
    Dupuis, Marc
    Geiger, Tamara
    Slayton, Marshelle
    Dewing, Frances
    [J]. PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 81 - 86
  • [5] A Path to Successful Management of Employee Security Compliance: An Empirical Study of Information Security Climate
    Goo, Jahyun
    Yim, Myung-Seong
    Kim, Dan J.
    [J]. IEEE TRANSACTIONS ON PROFESSIONAL COMMUNICATION, 2014, 57 (04) : 286 - 308
  • [6] Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future
    Haag, Steffi
    Siponen, Mikko
    Liu, Fufan
    [J]. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS, 2021, 52 (02): : 25 - 67
  • [7] Toward a Theory of Information Systems Security Behaviors of Organizational Employees: A Dialectical Process Perspective
    Karjalainen, Mari
    Sarker, Suprateek
    Siponen, Mikko
    [J]. INFORMATION SYSTEMS RESEARCH, 2019, 30 (02) : 687 - 704
  • [8] Examining the Boundary Effect of Information Systems Security Behavior Under Different Usage Purposes
    Li, Ying
    Pan, Ting
    Zhang, Nan
    [J]. IEEE ACCESS, 2019, 7 : 156544 - 156554
  • [9] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    [J]. MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [10] Nthala N, 2018, PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, P63