Exploring the Frontiers of Cybersecurity Behavior A Systematic Review of Studies and Theories
Exploring the Frontiers of Cybersecurity Behavior A Systematic Review of Studies and Theories
sciences
Review
Exploring the Frontiers of Cybersecurity Behavior:
A Systematic Review of Studies and Theories
Afrah Almansoori 1,2 , Mostafa Al-Emran 1,3, * and Khaled Shaalan 1
1 Faculty of Engineering & IT, The British University in Dubai, Dubai P.O. Box 345015, United Arab Emirates;
[email protected] (A.A.); [email protected] (K.S.)
2 General Department of Forensic Science and Criminology, Dubai Police G.H.Q., Dubai P.O. Box 1493,
United Arab Emirates
3 Department of Computer Techniques Engineering, Dijlah University College, Baghdad 00964, Iraq
* Correspondence: [email protected]
Abstract: Cybersecurity procedures and policies are prevalent countermeasures for protecting organi-
zations from cybercrimes and security incidents. Without considering human behaviors, implement-
ing these countermeasures will remain useless. Cybersecurity behavior has gained much attention
in recent years. However, a systematic review that provides extensive insights into cybersecurity
behavior through different technologies and services and covers various directions in large-scale
research remains lacking. Therefore, this study retrieved and analyzed 2210 articles published on
cybersecurity behavior. The retrieved articles were then thoroughly examined to meet the inclusion
and exclusion criteria, in which 39 studies published between 2012 and 2021 were ultimately picked
for further in-depth analysis. The main findings showed that the protection motivation theory (PMT)
dominated the list of theories and models examining cybersecurity behavior. Cybersecurity behavior
and intention behavior counted for the highest purpose for most studies, with fewer studies focusing
on cybersecurity awareness and compliance behavior. Most examined studies were conducted in
individualistic contexts with limited exposure to collectivistic societies. A total of 56% of the analyzed
studies focused on the organizational level, indicating that the individual level is still in its infancy
stage. To address the research gaps in cybersecurity behavior at the individual level, this review
proposes a number of research agendas that can be considered in future research. This review is
Citation: Almansoori, A.; Al-Emran,
believed to improve our understanding by revealing the full potential of cybersecurity behavior and
M.; Shaalan, K. Exploring the opening the door for further research opportunities.
Frontiers of Cybersecurity Behavior:
A Systematic Review of Studies and Keywords: cybersecurity; human behavior; information system theories; systematic review
Theories. Appl. Sci. 2023, 13, 5700.
https://doi.org/10.3390/
app13095700
1. Introduction
Academic Editor: Christos Bouras
The Internet and computers are working together to connect people worldwide [1].
Received: 20 March 2023 Hence, cybersecurity became a must-have framework. As a result, all communications
Revised: 2 May 2023
and information sharing will remain safe. Cybersecurity covers the Internet, computer net-
Accepted: 3 May 2023
works, and computing systems. Technological and organizational elements of cybercrime,
Published: 5 May 2023
such as databases, software administration, and computer programming, are essential for
individuals’ understanding [2,3]. Organizations and individuals utilize cybersecurity to
prevent illegal access to data centers and computerized systems. A robust cybersecurity
Copyright: © 2023 by the authors.
strategy is typically provided through solid security procedures.
Licensee MDPI, Basel, Switzerland. Cybersecurity threats come in three forms: cybercrimes, cyberattacks, and cyberterror-
This article is an open access article ism. Cybercrimes refer to crimes committed through the Internet and other digital means
distributed under the terms and and more conventional crimes enabled or sustained by these means [4]. Cyberattacks refer
conditions of the Creative Commons to cyberspace-based assaults aimed at disrupting, disabling, damaging, or maliciously man-
Attribution (CC BY) license (https:// aging a computer environment/infrastructure, ruining data integrity, or stealing sensitive
creativecommons.org/licenses/by/ information [5]. Cyberterrorism involves the disruption of crucial national infrastructure,
4.0/). encompassing transportation, energy, and governmental operations, through employing
organizations can better understand the root causes of cybersecurity behavior and develop
strategies to encourage positive behavior and minimize risk.
Further, being aware of which technologies are prevalent in the field helps researchers
and practitioners understand the current landscape and identify areas for further devel-
opment or improvement [25]. Moreover, analyzing research methods can inform future
studies by highlighting areas where new and different techniques may be needed to address
gaps or limitations in the current body of knowledge [26]. In addition, knowing which
countries are active in this area of research can help identify regional trends and dispar-
ities in knowledge, resources, and expertise. It also provides a sense of the global reach
of cybersecurity behavior research and highlights areas where additional research may
be needed. Furthermore, analyzing the participants is crucial because the demographic
characteristics and behavior of the participants can significantly impact the results and
conclusions of the study. Understanding the background, experience, and perspectives
of the participants can help to contextualize the findings and provide insights into the
generalizability of the results. Additionally, identifying the type of participants, such as
individuals, organizations, or communities, can highlight the scope and focus of the study
and shed light on the potential biases and limitations in the research. Consequently, this
review study intends to address the following research questions:
RQ1: What are the prominent IS theories and models in the context of cybersecurity behavior?
RQ2: What are the common themes in the articles under analysis?
RQ3: What are the common external factors affecting cybersecurity behavior?
RQ4: What is the relationship between the cybersecurity research themes and external factors?
RQ5: What are the dominant technologies and services used in cybersecurity behavior?
RQ6: What are the leading research methods used?
RQ7: What are the active countries in cybersecurity behavior research?
RQ8: What is the relationship between the cybersecurity research themes and study regions?
RQ9: Who are the participants in cybersecurity behavior research?
Following this section, Section 2 provides a background on cybersecurity behavior and
previous reviews on cybersecurity. Section 3 presents the review methodology, in which
inclusion and exclusion criteria, data sources and search strategies, and data coding and
analysis, are discussed. Section 4 shows the results by responding to all the formulated
research questions, while Section 5 discusses these results in detail. Section 6 concludes the
review and provides a number of research gaps that require further examination.
2. Background
2.1. Cybersecurity Behavior
The continued adoption of information technologies has been accompanied by the
need to enhance systems and data security [27]. Effective cybersecurity programs consider
the human element the weakest link in cybersecurity [28,29]. Implementing administrative
safeguards focusing on behavior is imperative to address people-related vulnerabilities.
Cybersecurity behavior refers to the individual practices that attenuate or minimize the risk
and likelihood of cyber threats. According to [30], focusing on social and behavioral issues
can help deal with cybersecurity. As such, identifying behaviors that can either enhance
or reduce the level of security is an essential consideration in creating and implementing
a cybersecurity strategy [17]. More importantly, fostering a solid cybersecurity culture in
which every member of the organization behaves appropriately reduces people-related
cyber vulnerabilities [31]. The idea is to discourage negative behaviors while encouraging
positive ones.
Various examples of negative security behaviors should be discouraged in organi-
zational settings. One such behavior is visiting unsafe websites [12]. In workplace en-
vironments, it is common for employees to visit potentially dangerous websites. Such
websites contain exploits targeting the organization’s systems [32]. Another negative be-
havior relates to falling victim to social engineering. Social engineering techniques are
the most utilized avenues for infecting and intruding into computer networks [33]. These
Appl. Sci. 2023, 13, 5700 4 of 32
techniques leverage human weaknesses such as greed, fear, negligence, and ignorance to
obtain sensitive information from people. For instance, an employee could be tricked into
opening a phishing link to win a present. Employees can also fail to back up data or secure
their portable devices. For example, the loss of a smartphone containing company data can
result in a major data breach.
Number of
Source Review Type Domain Aim
Reviewed Studies
Understanding and identifying the vulnerabilities
[36] Narrative review 1249 Healthcare and cybersecurity threats and their effect on
healthcare.
Understanding user differences related to good or
Software
[43] Systematic review 35 bad cyber hygiene behavior, and what users can
Engineering
do to support good cyber hygiene.
Uncovering the prevalent factors affecting a
healthcare organization’s cybersecurity posture
due to a lack of awareness of the cyber threat to
healthcare, identifying healthcare organizations’
[37] Systematic review 70 Healthcare
cyber defense strategy through studying human
behavior, and examining the organization’s risk
assessment approach and cybersecurity policies
that have been enacted.
Investigating human factors in cybersecurity,
[41] Systematic review 27 Social Science
which are subjective and often complex.
Reviewing the existing literature on cybersecurity
[34] Taxonomy review 56 Global
awareness among young people.
Consolidating a paradigm that examines the
[39] Systematic review 21 Global influence of temporal constraints on human
cybersecurity behaviors.
Understanding the underlying human behavioral
[40] Systematic review 60 Social sciences factors influencing cyber-information security
compliance from theoretical perspectives.
Investigating trends in cybersecurity behavioral
[38] Systematic review 107 Social sciences
research by synthesizing secondary literature.
Reviewing research on the recommended
[35] Systematic review 43 Computer science cybersecurity practices for social media users from
the user’s point of view.
Identifying strategies to address human factors in
[42] Systematic review 33 Computer science
cybersecurity.
Identifying information security policy
[44] Systematic review 32 Computer science
compliance behavior factors, models, and theories.
Appl. Sci. 2023, 13, 5700 5 of 32
Table 1. Cont.
Number of
Source Review Type Domain Aim
Reviewed Studies
Investigating the impact of cyber optimistic bias
on an individual’s security risk perception and its
[45] Meta-analysis 9 Social science-es
subsequent influence on their decision-making
process.
Analyzing teenagers’ behavior and its potential
[46] Systematic review 54 Computer science susceptibility to exploitation on social media
platforms.
Evaluating common approaches utilized in
[47] Systematic review 26 Social science
examining cybersecurity-related behavior.
Conducting a systematic review of cybersecurity
behavior from the perspective of IS theories and
models to examine the main research themes,
This Study Systematic review 39 Global
influential factors, dominant technologies and
services, research methods, active countries, and
the interrelationships among these characteristics.
Although numerous review studies have been conducted in recent years, providing
scholars with valuable information on cybersecurity behavior. It has been noticed that
research has neglected the review of cybersecurity behavior from the lenses of IS theo-
ries and models. This issue was the driving force behind the decision to conduct this
systematic review.
3. Method
This review is based on the results of studies published in digital journals and
databases to debate and empirically analyze IS theories and models in cybersecurity behav-
ior. A literature review is crucial to every scientific study [48]. It lays the groundwork for
information accumulation, promoting the development and refinement of ideas, filling gaps
in existing research, and discovering places past research has missed [49]. A systematic
review assists researchers in gaining a deeper understanding of the research topic under
investigation [50,51]. Systematic reviews are distinct from traditional or narrative reviews
since they are more thorough and provide a well-defined methodology for reviewing a
particular topic [52]. This study intends to comprehensively review past studies on cy-
bersecurity behavior involving IS theories and models, focusing on the common research
themes, external factors, dominant technologies and services, main research methods,
active countries, participants, and the interrelationships among these characteristics. The
systematic review is divided into three stages: determining inclusion and exclusion criteria,
data sources and search methods, and data coding and analysis.
3.2.Data
3.2. DataSources
SourcesandandSearch
SearchStrategies
Strategies
Thedata
The data were
were collected
collected through
through different
different online online
databases,databases, such as Springer,
such as Emerald, Emerald,
Springer,
Taylor, andTaylor,
Francis,and IEEEFrancis,
Explore,IEEE
SAGE,Explore,
ScienceSAGE, Science
Direct, Direct, Scholar.
and Google and Google The Scholar.
studies
The studies were searched in these databases between June–August
were searched in these databases between June–August of 2021. The retrieved studies of 2021. The retrieved
studies
were were restricted
restricted to journaltoarticles
journalandarticles and conference
conference proceedings.proceedings.
The searchThestring
searchforstring
the
for the was
studies studies was ((“cybersecurity”
((“cybersecurity” OR “cyber OR security”)
“cyber security”) AND (“behavior”
AND (“behavior” OR “behav-
OR “behaviour”)).
iour”)).
The The selection
selection of relevant of keywords
relevant keywords
is critical is critical
since since it influences
it influences the of
the retrieval retrieval
relevantof
articles
relevantfrom databases
articles [53].
from databases [53].
The
Thesearch
searchresults
resultsretrieved
retrieved 2210
2210articles by using
articles by usingthe mentioned
the mentionedsearch string.string.
search A totalA
of 227 were found as duplicate articles, and thus, were discarded.
total of 227 were found as duplicate articles, and thus, were discarded. The remaining The remaining articles
become
articles 1983.
become The1983.
inclusion and exclusion
The inclusion criteria were
and exclusion applied
criteria were strictly
appliedfor the remaining
strictly for the re-
articles.
mainingThe entireThe
articles. review
entireprocess
reviewfollowed the preferred
process followed reporting
the preferred items foritems
reporting systematic
for sys-
reviews
tematic and meta-analysis
reviews (PRISMA),
and meta-analysis as depicted
(PRISMA), in Figure
as depicted 1. The1.first
in Figure Theand
first second au-
and second
thors of this
authors research
of this independently
research independently analyzed
analyzedeacheach
of theof gathered
the gatheredpapers to conduct
papers the
to conduct
analysis. The two
the analysis. Theauthors reconciled
two authors their discrepancies
reconciled in analyzing
their discrepancies the studies
in analyzing thethrough
studies
conversation and further examination of the contested papers.
through conversation and further examination of the contested papers. The total The total number of number
articles
consulted
of articlesfor this study
consulted foristhis
39.study is 39.
Figure1.1.PRISMA
Figure PRISMAflowchart.
flowchart.
PEER REVIEW 7 of 32
Further, the GDT emphasizes rationality in modeling behavior. The downside of this ap-
proach is that people can be irrational sometimes. TPB’s main strength is that it considers
subjective norms, perceived behavioral control, and attitudes in affecting behavior. How-
Appl. Sci. 2023, 13, 5700 8 of 32
Table 4. Cont.
in the analyzed articles. It can be seen that the cybersecurity behavior and intention be-
havior counted the highest purpose for conducting most of the studies, with 14 studies for
each. This is followed by avoidance behavior and avoidance motivation, with five studies
each. Further, the analysis also shows four studies for usage behavior and three for each
compliance behavior and cybersecurity awareness.
impact compliance behavior. Additionally, it was noticed that perceived costs, response ef-
23, 13, x FOR PEER REVIEW ficacy, self-efficacy, perceived severity, and perceived vulnerability have13 of 32
significant impacts
on cybersecurity awareness.
Social networking sites collect large quantities of data daily [67,68]. Therefore, appro-
priate cybersecurity behavior among social media users is critical to preserving privacy.
Some security best practices on social media include managing privacy settings, main-
taining personal information, using secure devices, and being cautious [69]. For instance,
Addae et al. [70] devised a personal data attitude assessment instrument by employing
psychometric principles, enabling the reliable quantification and comparison of attitudes.
The research involved administering an online questionnaire to 247 participants. The results
indicate that factors shaping individuals’ attitudes toward personal data encompass privacy
concerns, protective practices, awareness, cost-benefit analysis, security, and responsibility.
Consequently, the trustworthiness of social networking can be evaluated based on these six
constructs for both individuals and organizations. Another study [71] employed principles
derived from the TPB to investigate the mediating effect of information security aware-
ness on users’ intentions to examine privacy settings on Facebook. The results indicate
that information security awareness does, indeed, mediate security behavior in certain
personality traits, particularly openness, and conscientiousness. The study highlights that
openness and conscientiousness can shape individuals’ and organizations’ perceptions of
social networks’ trustworthiness, particularly when those in decision-making roles exhibit
these traits. In addition, Van Schaik et al. [72] demonstrated that the “affect heuristic”
significantly shapes risk perception within the cybersecurity domain. This indicates that
an individual’s perception of the risk associated with a specific technology is directly
influenced by the affective response elicited by that technology. Consequently, if individu-
als perceive using a typical social networking platform as advantageous, they will likely
regard it as beneficial and trustworthy. A parallel perception can be anticipated within
organizational contexts.
Smartphones also collect highly confidential data from users, including location,
messages, phone calls, images, and personal information. Hence, positive cybersecurity
behavior can help secure the data on these devices. Web browsers, which are utilized to
surf the web, can be exploited, resulting in cyberattacks. Therefore, users must exhibit
Appl. Sci. 2023, 13, 5700 14 of 32
4.9.inMain
4.9. Main Participants Participants in
Cybersecurity Cybersecurity
Behavior Behavior Research
Research
Understanding the participants in previous cybersecurity behavior research assists
Understandinginthe participants
conducting in previous
future trials. cybersecurity
The analysis also helps us behavior research
to understand whetherassists
the existing
in conducting future trials.has
research The analysis the
emphasized also helps usorto
individual understandlevel.
organizational whether
Figure the existing the
6 demonstrates
research has emphasized the individual
distribution or organizational
of the analyzed studies in terms oflevel. FigureIt6can
participants. demonstrates thecyber-
be observed that
security behavior studies were primarily focused on organizational
distribution of the analyzed studies in terms of participants. It can be observed that cyber- employees (N = 22),
including managers, decision-makers, IT experts, and end-user employees. This is followed
security behavior studies were primarily focused on organizational employees (N = 22),
by students (N = 13), consumers (N = 4), academics (N = 3), including researchers and
including managers, decision-makers,
lecturers, and parents (NIT experts, and end-user employees. This is fol-
= 1).
lowed by students (N = 13), consumers (N = 4), academics (N = 3), including researchers
and lecturers, and parents (N = 1).
in conducting future trials. The analysis also helps us to understand whether the existing
research has emphasized the individual or organizational level. Figure 6 demonstrates the
distribution of the analyzed studies in terms of participants. It can be observed that cyber-
security behavior studies were primarily focused on organizational employees (N = 22),
including managers, decision-makers, IT experts, and end-user employees. This is fol-
Appl. Sci. 2023, 13, 5700 16 of 32
lowed by students (N = 13), consumers (N = 4), academics (N = 3), including researchers
and lecturers, and parents (N = 1).
theory. These results suggest that further research needs to consider the role of social, tech-
nical, and psychological factors in understanding cybersecurity behavior. While analyzing
the external factors, it has been noticed that the role of moderators is neglected in the extant
literature. This issue was also discussed in a recent study conducted on employees’ security
behavior [86].
This review also analyzed the relationship between the cybersecurity research themes
and the external factors, technologies/services, and active countries. In terms of ‘intention
behavior’, it was found that self-efficacy, response efficacy, response cost, subjective norms,
perceived usefulness, and perceived ease of use significantly impact intention behavior.
The studies mainly focused on examining the intention behavior toward using several
technologies/services, such as information systems [87,88], Internet security software [71],
malware [56], anti-malware software [61], social networking sites [70,71], web browsers [55],
games [89,90], e-mails [60], and smartphones [81,82]. The ‘intention behavior’ has been
primarily studied in the USA, UAE, U.K., Australia, and Malaysia, respectively.
In terms of cybersecurity behavior, the results showed that perceived severity, self-
efficacy, perceived vulnerability, cues to action, response efficacy, peer behavior, and
perceived barriers were the most influential factors. The technologies/services under this
theme include information systems [91], social networking sites [70,72], web browsers [55],
computers [80], smartphones [92], and Internet threats [93]. Understanding what impacts
cybersecurity behavior was mainly studied in the USA, U.K., and China, respectively.
For avoidance behavior and avoidance motivation, the results indicated that self-
efficacy, perceived susceptibility, perceived severity, perceived cost, safeguard effectiveness,
safeguard cost, and perceived effectiveness were the dominant influential factors. The
leading technologies/services investigated under this theme include Internet threats [83],
games [54], smartphones [94], and malware [59]. The USA and Australia were the only
active countries conducting studies on avoidance behavior and avoidance motivation. The
increasing interest in these two countries stems from the COVID-19 pandemic-related
cybercrime reported cases, which have increased to 300% in the USA [95] and 75% in
Australia [96].
Concerning the ‘usage behavior’, the findings showed that perceived ease of use,
facilitating conditions, self-efficacy, trust, and habit have significant impacts on using
several technologies/services from the perspective of cybercrimes and security incidents.
These technologies/services include web browsers [59], games [89], smartphones [97], and
e-mails [98]. This theme has been mainly studied in Australia and Taiwan.
In terms of ‘compliance behavior’, the results found that attitude, response cost,
subjective norms, and self-efficacy were the most influential factors. Smartphones were
the primary technology examined under this cluster [81]. The other studies that examined
compliance behavior specified neither the technology nor the service used [99,100]. The
USA has dominated the list for conducting studies related to this cluster.
For ‘cybersecurity awareness’, the results indicated that perceived costs, response
efficacy, self-efficacy, perceived severity, and perceived vulnerability were the most com-
mon determinants affecting the individuals’ cybersecurity awareness. The main technolo-
gies/services examined under this theme include computers [80], IoT [101], and social
networking sites [71]. This has been mainly studied in Australia and Switzerland.
bersecurity behavior. This observation provides evidence that understanding what impacts
cybersecurity behavior at the individual level is still in short supply, which requires further
investigation.
To address the gaps in cybersecurity behavior research at the individual level, this
review proposes a number of future research agendas. Future research should focus on
the impact of social and psychological factors, such as peer influence, cultural values,
and individual beliefs and attitudes, on cybersecurity behavior. Technical determinants,
such as technology literacy and accessibility, should also be considered. Additionally,
further research should be conducted to understand the factors influencing awareness and
compliance with cybersecurity best practices and policies. This can include studies on the
impact of training and education programs and the role of incentives and consequences.
The role of moderators, such as age, sex, and technical experience, in shaping the effects of
other determinants on cybersecurity behavior should also be investigated at the individual
level. This can help to explain inconsistencies in the existing literature. Moreover, research
at the individual level should be conducted in collectivistic societies to understand how
cultural values and group norms shape cybersecurity behavior. Future research needs
to be conducted longitudinally to understand how cybersecurity behavior changes over
time and in response to different factors and events. Comparative studies can also be
suggested across different cultures and regions to understand how cultural and regional
factors influence cybersecurity behavior.
In summary, cybersecurity is crucial for both organizations and individuals. It has
been observed that an increasing number of non-expert social media users are becoming
aware of the significance of various security measures [106]. Furthermore, individuals
are less inclined to divulge personal information due to privacy concerns [107]. As stated
in [108], security, privacy, and resilience are vital components of healthcare applications.
Additionally, the Metaverse is not immune to security and privacy violations linked to
human behavior, as noted in [109,110]. Consequently, Kannelønning and Katsikas [47]
underscored the necessity for implementing policies to regulate employee conduct within
organizations. Enhanced education and awareness contribute to improved cybersecurity
behavior [111,112]. Therefore, raising information security awareness can foster positive
behavior among employees [113].
Author Contributions: Conceptualization, A.A. and M.A.-E.; methodology, A.A. and M.A.-E.; valida-
tion, A.A. and M.A.-E.; formal analysis, A.A.; investigation, A.A.; resources, A.A.; writing—original
draft preparation, A.A.; writing—review and editing, M.A.-E. and K.S.; supervision, M.A.-E. and
K.S.; project administration, M.A.-E. All authors have read and agreed to the published version of
the manuscript.
Funding: This research received no external funding.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: The data presented in this study are available on request from the authors.
Conflicts of Interest: The authors declare no conflict of interest.
Appl. Sci. 2023, 13, 5700 21 of 32
Appendix A
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Perceived susceptibility”,
“Avoidance Motivation”
Technology Threat “Perceived severity”, “Perceived Quantitative Organizational
S01 [83] 2021 and “Avoidance Internet threats USA
Avoidance Theory effectiveness”, “Perceived cost”, and (survey) employees
Behavior”
“Self-efficacy”
“Information security policy”,
“Subjective norm”, “Perceived Mixed method
Social Cognitive Organizational
S02 [114] 2019 inconvenience”, “Self-efficacy”, Assurance Behavior Information system (survey and Malaysia
Theory employees
“Outcome expectation”, and focus group)
“Information security monitoring”
“Procrastination”,
“Psychological
“Perceived externality” and Quantitative Organizational
S03 [91] 2019 Coping Theory detachment”, and Information system China
“Triage” (survey) employees
“Cybersecurity
Behavior”
Job “Continuity demand”, “Mandatory “Perseverance of effort”
Quantitative Organizational Not
S04 [88] 2020 Demands-Resources demand”, “Trust enhancement”, and “Intention Information system
(survey) employees Specified
Model and “Professional development” Behavior”
“Reward expectancy”, “Punishment
Compliance Theory Quantitative Organizational
S05 [100] 2021 expectancy”, and “Organizational “Compliance Behavior” Not Specified China
and Control Theory (survey) employees
commitment”
“Punishment likelihood”, “Reward
Decision-making Quantitative
S06 [87] 2021 likelihood”, and “Neutralization “Intention Behavior” Information system Students USA
Theory (survey)
scenarios”
“Compatibility”, “Ease of use”,
“images”, “intention”, “Relative
Innovation Diffusion Internet security Quantitative
S07 [115] 2018 advantage”, “Results “Intention Behavior” Students Malaysia
Theory software (survey)
demonstrability”, “Trialability”,
“Visibility”, and “Voluntariness”
Appl. Sci. 2023, 13, 5700 22 of 32
Table 1. Cont.
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Perceived price level”,
Theory of Planned “Information security awareness”, “Attitude” and Anti-malware Quantitative
S08 [61] 2019 Students Malaysia
Behavior “Subjective norms”, and “Perceived “Intention Behavior” software (survey)
behavioral control”
“Perceived usefulness”,
Protection Motivation “Attitude to personal data”, Mixed method
“Intention Behavior”, Social networking Not
S09 [70] 2017 Theory and Threat “Perceived risk”, and “Perceived (survey and Consumers
and “Cybersecurity sites Specified
Avoidance Motivation ease of use” focus group)
Behavior”
“Self-efficacy”, “Security breach
“Intention Behavior”,
concern level”, “Perceived risk”,
“Cybersecurity
Protection Motivation “Domain knowledge”, “System
Behavior”, “Usage Quantitative Students and China and
S10 [55] 2019 Theory and Threat characteristics”, “Perceived ease of Web browser
Behavior”, “Value for (survey) academics U.K.
Avoidance Motivation use”, “Perceived usefulness”,
personalization”, and
“Value for personalization” and
“Attitude”
“Attitude to personal data”
“Fear”, “Safeguard effectiveness”,
“Safeguard cost”, “Self-efficacy”, “Avoidance Motivation”
Technology Threat Quantitative
S11 [54] 2020 “Perceived severity”, “Perceived and “Avoidance Game Students Australia
Avoidance Theory (survey)
susceptibility”, and Behavior”
“Decision-making style”
“Performance expectancy”, “Effort
Unified Theory of expectancy”, “Facilitating
“Intention Behavior” Quantitative
S12 [89] 2020 Acceptance and conditions”, “Hedonic motivation”, Game Students Australia
and “Usage Behavior” (survey)
Usage of Technology “Social influence”, “Habit”, and
“Gamification feature”
“Perceived vulnerability”,
“Perceived severity”, “Perceived
“Cybersecurity
self-efficacy”, “Perceived response
Protection Motivation Awareness” and Quantitative Organizational
S13 [80] 2019 efficacy”, “Perceived costs”, Computer Switzerland
Theory “Cybersecurity (survey) employees
“Organizational determinants”,
Behavior”
“Social determinants”, and
“Personal determinants”
Appl. Sci. 2023, 13, 5700 23 of 32
Table 1. Cont.
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Greater employment level”,
“Grater perception of personal risk”,
Knowledge, Attitude, “Cybersecurity Quantitative Organizational
S14 [101] 2020 “Grater dread and unfamiliarity of Internet of Things Australia
and Behavior Model Awareness” (survey) employees
InfoSec risks”, and “Greater
organizational commitment”
“Cyber attack experience”,
Theory of Social “Perceived cybersecurity risk”, Quantitative Organizational
S15 [116] 2019 “Cooperate Intention” Ecosystem Norway
Preferences “Perceived cybersecurity value”, (survey) employees
and “Social preferences”
“Subjective norm”, “Attitude”,
Theory of Planned
“Hardness”, “Habit”, “Perceived Quantitative Organizational
S16 [117] 2020 Behavior and Threat “Compliance Intention” Not Specified USA
severity”, and “Perceived (survey) employees
Avoidance Motivation
vulnerability”
“Perceived vulnerability”,
“Perceived severity”, “Rewards”,
Protection Motivation
“Perceived shame”, “Response
Theory, Theory of
efficacy”, “Self-efficacy”, “Response Quantitative Organizational New
S17 [60] 2020 Planned Behavior, “Intention Behavior” E-mail
cost”, “Habit”, “Subjective norms”, (survey) employees Zealand
and General
“Procedural countermeasures”,
Deterrence Theory
“Preventive countermeasures”, and
“Detective countermeasures”
Technology Threat
Avoidance Theory “Security intention”, “Self-efficacy”, “Cybersecurity Quantitative Organizational Not
S18 [92] 2020 Smartphone
and Protection and “Psychological ownership” Behavior” (Survey) employees Specified
Motivation Theory
“Risk-taking” and Quantitative Students and
S19 [90] 2021 Big Five Model “Intention Behavior” Game Iran
“Decision-making styles” (Survey) academics
“Peer Behavior” and
Protection Motivation Quantitative Organizational
S20 [118] 2014 “Explicit cybersecurity policy” “Cybersecurity Not Specified USA
Theory (Survey) employees
Behavior”
Appl. Sci. 2023, 13, 5700 24 of 32
Table 1. Cont.
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Computer skills”, “Information
seeking skills”, “Experience with
cybersecurity practice”, “Perceived
Protection Motivation susceptibility”, “Perceived severity”, “Cybersecurity Quantitative Organizational Not
S21 [119] 2017 Not Specified
Theory “Self-efficacy”, “Perceived barriers”, Behavior” (Survey) employees Specified
“Perceived benefits”, “Response
efficacy”, “Cues to action”, and
“Peer behavior”
“Social networking sites”,
“Communication”,
“Video-watching”, “Game-playing”,
6-T Internet attitude “Photo-sharing”, “Academy”, Quantitative Students and
S22 [97] 2019 “Usage Behavior” Smartphone Taiwan
model “Recreational info. searching”, (Survey) parents
“Friends making”, “Transaction”,
“Individual factors”, and “Parental
factors”
“Situational support”, “Behavioral
Protection Motivation Quantitative
S23 [12] 2021 “Self-efficacy”, and “Response comprehensiveness” Not Specified Students China
Theory (Survey)
efficacy” and “Behavioral habits”
“Agreeableness”,
“Intention Behavior”
Theory of Planned “Conscientiousness”, Social networking Quantitative Not
S24 [71] 2021 and “Cybersecurity Consumers
Behavior “Extraversion”, “Neuroticism”, and sites (Survey) Specified
Awareness”
“Openness”
“National smartphone cybersecurity
policies”, “Response cost”, “Top
management participation”,
Protection Motivation
“Technology (smartphone-specific)
Theory, Theory of “Intention Behavior”
security threats”, “Attitude”, Quantitative Organizational U.K., USA,
S25 [81] 2021 Reasoned Action, and and “Compliance Smartphone
“Self-efficacy”, “Subjective norms”, (Survey) employees and UAE
General Deterrence Behavior”
“Perceived risk vulnerability”,
Theory
“Perceived response efficacy”,
“Perceived severity of sanction”, and
“Perceived certainty of sanction”
Appl. Sci. 2023, 13, 5700 25 of 32
Table 1. Cont.
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Peer behavior”, “Cues to action”,
“Prior experience with information
Protection Motivation security practice”, “Perceived “Cybersecurity Quantitative Organizational
S26 [64] 2019 Not Specified USA
Theory severity”, “Perceived vulnerability”, Behavior” (Survey) employees
“Perceived barriers”, “Response
efficacy”, and “Self-efficacy”
Technology Threat “Avoidance Motivation”
“Anti-Phishing self-efficacy” and Quantitative Not
S27 [94] 2019 Avoidance Theory and “Avoidance Smartphone Consumers
“Anticipated regret” (Survey) Specified
and Regret Theory Behavior”
“Self-efficacy”, “Perceived severity
of sanction”, “Perceived risk
vulnerability”, “Response cost”,
“Perceived certainty of sanction”,
Protection Motivation
“Severity of the adverse Quantitative Organizational USA and
S28 [82] 2020 Theory and General “Intention Behavior” Smartphone
consequences”, “Response efficacy”, (Survey) employees UAE
Deterrence Theory
“Uncertainty avoidance”, “Power
distance”, “Individualism vs.
collection”, and “Masculinity vs.
femininity”
“Severity”, “Susceptibility”,
“Self-efficacy”, “Response efficacy”,
“Response costs”, “Experience”,
Protection Motivation “Workplace information sensitivity Quantitative Organizational Not
S29 [56] 2018 “Intention Behavior” Malware
Theory appraisal”, “Responsibility”, (Survey) employees Specified
“Psychological ownership”, and
“Organisational citizenship
behaviors”
Individual
“Dominant decision style”,
cybersecurity
“General security orientation”,
compliance behavior Quantitative Students and
S30 [99] 2020 “General security awareness”, “Compliance Behavior” Not Specified Jamaica
model and Donalds (Survey) academics
“Dominant orientation”, and
and Osei-Bryson
“Security self-efficacy”
model
Appl. Sci. 2023, 13, 5700 26 of 32
Table 1. Cont.
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Perceived severity”, “Perceived
Protection Motivation vulnerability”, “Perceived barriers”, “Cybersecurity Quantitative Organizational Saudi
S31 [120] 2021 Not Specified
Theory “Response efficacy”, and “Security Behavior” (Survey) employees Arabia
self-efficacy”
“Avoidance
“Perceived susceptibility”,
Motivation”,
Technology Threat “Perceived severity”, “Perceived Quantitative Organizational
S32 [58] 2020 “Avoidance Behavior”, Not Specified USA
Avoidance Theory effectiveness”, “Perceived cost”, and (Survey) employees
and “Cybersecurity
“Self-efficacy”
Behavior”
Actor-network “Familiarity” and “Internet “Cybersecurity Quantitative U.K. and
S33 [93] 2017 Internet threats Students
Theory experience proxies” Behavior” (Survey) USA
Protection Motivation
“Affect”, “Perceived risk”, and “Cybersecurity Social networking Quantitative
S34 [72] 2020 Theory and Affect Consumers U.K.
“Perceived benefit” Behavior” sites (Survey)
heuristic model
“Perceived vulnerability”, “Prior
experience with computer security”,
Protection Motivation “Perceived severity”, “Security
“Cybersecurity Quantitative
S35 [63] 2019 Theory and Health self-efficacy”, “Response efficacy”, Not Specified Students Malaysia
Behavior” (Survey)
Belief Model “Cues to action”, “Peer behavior”,
“Computer skills”, and “Familiarity
with cyber threats”
“Perceived susceptibility”,
“Avoidance Motivation”
Technology Threat “Perceived severity”, “Perceived Quantitative
S36 [59] 2016 and “Avoidance Malware Students USA
Avoidance Theory threat”, “Safeguard effectiveness”, (Survey)
Behavior”
“Safeguard cost”, and “Self-efficacy”
“Computer skills”, “Experience
with cybersecurity practice”,
“Perceived vulnerability”,
Protection Motivation
“Perceived severity”, “Self-efficacy”, “Cybersecurity Quantitative Organizational
S37 [84] 2019 Theory and Health Not Specified USA
“Perceived barriers”, “Perceived Behavior” (Survey) employees
Belief Model
benefits”, “Response efficacy”,
“Cues to action”, and “Peer
behavior”
Appl. Sci. 2023, 13, 5700 27 of 32
Table 1. Cont.
# Source Year Theoretical Model Independent Variables Dependent Variables Technology/Service Methodology Participants Country
“Threat severity”, “Threat
vulnerability”, “Self-efficacy”,
“Response efficacy”, “Response
Protection Motivation
cost”, “Sanction severity”, “Sanction Quantitative Organizational
S38 [121] 2012 Theory and General “Intention Behavior” Not Specified USA
certainty”, “Agreeableness”, (Survey) employees
Deterrence Theory
“Conscientiousness”,
“Extraversion”, “Neuroticism”, and
“Openness”
Japan, South
Korea, India,
Australia,
Hong Kong,
“Human Intention and Perception”,
Taiwan,
“Perceived Trust and beliefs”,
Quantitative Organizational Singapore,
S39 [98] 2021 Not Specified “Perceived e-mail security”, “Usage Behavior” E-mail
(Survey) employees New
“Perceived Privacy”, and
Zealand,
“Information Sharing”
Malaysia,
Indonesia,
and the
Philippines
Appl. Sci. 2023, 13, 5700 28 of 32
References
1. Seki, T.; Çimen, F.; Dilmaç, B. The Effect of Emotional Intelligence on Cyber Security: The Mediator Role of Mindfulness. Bartın
Univ. J. Fac. Educ. 2023, 12, 190–199. [CrossRef]
2. González-Manzano, L.; de Fuentes, J.M. Design recommendations for online cybersecurity courses. Comput. Secur. 2019, 80,
238–256. [CrossRef]
3. NIST. NIST Special Publication 800-181: National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework;
National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017.
4. Donalds, C.; Osei-Bryson, K.M. Toward a cybercrime classification ontology: A knowledge-based approach. Comput. Hum. Behav.
2019, 92, 403–418. [CrossRef]
5. NIST. Cyber Attack—Glossary; CSRC: Gaithersburg, MD, USA, 2012.
6. Lewis, J.A. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats; Center for Strategic & International Studies:
Washington, DC, USA, 2002.
7. Almomani, O.; Almaiah, M.A.; Alsaaidah, A.; Smadi, S.; Mohammad, A.H.; Althunibat, A. Machine Learning Classifiers for
Network Intrusion Detection System: Comparative Study. In Proceedings of the 2021 International Conference on Information
Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 440–445. [CrossRef]
8. Mohammad, A.H. Intrusion Detection Using a New Hybrid Feature Selection Model. Intell. Autom. Soft Comput. 2021, 30, 65–80.
[CrossRef]
9. Von Solms, R.; Van Niekerk, J. From information security to cyber security. Comput. Secur. 2013, 38, 97–102. [CrossRef]
10. Smadia, S.; Almomanib, O.; Mohammadc, A.; Alauthmand, M.; Saaidahe, A. VPN Encrypted Traffic classification using XGBoost.
Int. J. Emerg. Trends Eng. Res. 2021, 9, 960–966.
11. Cybersecurity Education Guides. Cybersecurity Industries and Domains|Careers and Jobs. Available online: https://www.
cybersecurityeducationguides.org/industries-and-domains/ (accessed on 19 March 2023).
12. Hong, Y.; Furnell, S. Understanding cybersecurity behavioral habits: Insights from situational support. J. Inf. Secur. Appl. 2021,
57, 102710. [CrossRef]
13. Reeves, A.; Calic, D.; Delfabbro, P. “Get a red-hot poker and open up my eyes, it’s so boring” 1: Employee perceptions of
cybersecurity training. Comput. Secur. 2021, 106, 102281. [CrossRef]
14. Al-Emran, M.; Griffy-Brown, C. The role of technology adoption in sustainable development: Overview, opportunities, challenges,
and future research agendas. Technol. Soc. 2023, 73, 102240. [CrossRef]
15. Chowdhury, N.H.; Adam, M.T.P.; Teubner, T. Time pressure in human cybersecurity behavior: Theoretical framework and
countermeasures. Comput. Secur. 2020, 97, 101931. [CrossRef]
16. Mashiane, T.; Kritzinger, E. Cybersecurity Behaviour: A Conceptual Taxonomy. In Information Security Theory and Practice; Lecture
Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics);
Springer: Cham, Switzerland, 2019; Volume 11469, pp. 147–156.
17. Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, Ł.; Cetin, F.; Basim, H.N. Cyber Security Awareness, Knowledge and Behavior:
A Comparative Study. J. Comput. Inf. Syst. 2022, 62, 82–97. [CrossRef]
18. Rogers, R.W. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation.
In Social Psychophysiology: A Sourcebook; Guilford Press: New York, NY, USA, 1983; pp. 153–176.
19. Ajzen, I. The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 1991, 50, 179–211. [CrossRef]
20. Khando, K.; Gao, S.; Islam, S.M.; Salman, A. Enhancing employees information security awareness in private and public
organisations: A systematic literature review. Comput. Secur. 2021, 106, 102267. [CrossRef]
21. Svabensky, V.; Vykopal, J.; Celeda, P. What Are Cybersecurity Education Papers About? A Systematic Literature Review of
SIGCSE and ITiCSE Conferences. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education, SIGCSE
2020, Portland, OR, USA, 11–14 March 2020; pp. 2–8. [CrossRef]
22. Fujs, D.; Mihelič, A.; Vrhovec, S.L.R. The power of interpretation: Qualitative methods in cybersecurity research. In Proceedings of
the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019; ACM: New York,
NY, USA, 2019.
23. AlShamsi, M.; Al-Emran, M.; Shaalan, K. A Systematic Review on Blockchain Adoption. Appl. Sci. 2022, 12, 4245. [CrossRef]
24. Al-Qaysi, N.; Mohamad-Nordin, N.; Al-Emran, M. Factors Affecting the Adoption of Social Media in Higher Education:
A Systematic Review of the Technology Acceptance Model. In Recent Advances in Intelligent Systems and Smart Applications;
Springer: Berlin/Heidelberg, Germany, 2021; pp. 571–584.
25. Alqudah, A.A.; Al-Emran, M.; Shaalan, K. Technology Acceptance in Healthcare: A Systematic Review. Appl. Sci. 2021, 11, 10537.
[CrossRef]
26. Alsharida, R.A.; Hammood, M.M.; Al-Emran, M. Mobile Learning Adoption: A Systematic Review of the Technology Acceptance
Model from 2017 to 2020. Int. J. Emerg. Technol. Learn. 2021, 15, 147–162. [CrossRef]
27. Baraković, S.; Husić, J.B. The Importance of Security Matters for Quality of Experience in Mobile Web Context. Int. J. Hum.–Comput.
Interact. 2022, 39, 1712–1722. [CrossRef]
28. Rahman, T.; Rohan, R.; Pal, D.; Kanthamanon, P. Human Factors in Cybersecurity: A Scoping Review. In Proceedings of the
12th International Conference on Advances in Information Technology, Bangkok, Thailand, 29 June 2021–1 July 2021; ACM:
New York, NY, USA, 2021. [CrossRef]
Appl. Sci. 2023, 13, 5700 29 of 32
29. Mc Mahon, C. In Defence of the Human Factor. Front. Psychol. 2020, 11, 2–5. [CrossRef]
30. Maalem Lahcen, R.A.; Caulkins, B.; Mohapatra, R.; Kumar, M. Review and insight on the behavioral aspects of cybersecurity.
Cybersecurity 2020, 3, 10. [CrossRef]
31. Alshaikh, M. Developing cybersecurity culture to influence employee behavior: A practice perspective. Comput. Secur. 2020,
98, 102003. [CrossRef]
32. Edkrantz, M.; Truve, S.; Said, A. Predicting Vulnerability Exploits in the Wild. In Proceedings of the 2nd International Conference
on Cyber Security and Cloud Computing, New York, NY, USA, 3–5 November 2015; pp. 513–514. [CrossRef]
33. Klimburg-Witjes, N.; Wentland, A. Hacking Humans? Social Engineering and the Construction of the “Deficient User” in
Cybersecurity Discourses. Sci. Technol. Hum. Values 2021, 46, 1316–1339. [CrossRef]
34. Quayyum, F.; Cruzes, D.S.; Jaccheri, L. Cybersecurity awareness for children: A systematic literature review. Int. J. Child-Comput.
Interact. 2021, 30, 100343. [CrossRef]
35. Herath, T.B.G.; Khanna, P.; Ahmed, M. Cybersecurity Practices for Social Media Users: A Systematic Literature Review. J. Cyberse-
cur. Priv. 2022, 2, 1. [CrossRef]
36. Coventry, L.; Branley, D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas 2018, 113,
48–52. [CrossRef]
37. Nifakos, S.; Chandramouli, K.; Nikolaou, C.K.; Papachristou, P.; Koch, S.; Panaousis, E.; Bonacina, S. Influence of Human Factors
on Cyber Security within Healthcare Organisations: A Systematic Review. Sensors 2021, 21, 5119. [CrossRef]
38. Khan, N.F.; Yaqoob, A.; Khan, M.S.; Ikram, N. The cybersecurity behavioral research: A tertiary study. Comput. Secur. 2022,
120, 102826. [CrossRef]
39. Chowdhury, N.H.; Adam, M.T.P.; Skinner, G. The impact of time pressure on cybersecurity behaviour: A systematic literature
review. Behav. Inf. Technol. 2019, 38, 1290–1308. [CrossRef]
40. Sulaiman, N.S.; Fauzi, M.A.; Wider, W.; Rajadurai, J.; Hussain, S.; Harun, S.A. Cyber–Information Security Compliance and
Violation Behaviour in Organisations: A Systematic Review. Soc. Sci. 2022, 11, 386. [CrossRef]
41. Jeong, J.; Mihelcic, J.; Oliver, G.; Rudolph, C. Towards an improved understanding of human factors in cybersecurity. In Proceed-
ings of the 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, 12–14 December
2019; pp. 338–345. [CrossRef]
42. Hakami, M.; Alshaikh, M. Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study. IJCSNS Int. J.
Comput. Sci. Netw. Secur. 2022, 22, 299–309.
43. Kalhoro, S.; Rehman, M.; Ponnusamy, V.A.P.; Shaikh, F. Extracting Key Factors of Cyber Hygiene Behaviour among Software
Engineers: A Systematic Literature Review. IEEE Access 2021, 9, 99339–99363. [CrossRef]
44. Kuppusamy, P.; Samy, G.N.; Maarop, N.; Shanmugam, B.; Perumal, S. Information Security Policy Compliance Behavior Models,
Theories, and Influencing Factors: A Systematic Literature Review. J. Theor. Appl. Inf. Technol. 2022, 100, 1536–1557.
45. Alnifie, K.M.; Kim, C. Appraising the Manifestation of Optimism Bias and Its Impact on Human Perception of Cyber Security:
A Meta Analysis. J. Inf. Secur. 2023, 14, 93–110. [CrossRef]
46. Chang, V.; Golightly, L.; Xu, Q.A.; Boonmee, T.; Liu, B.S. Cybersecurity for children: An investigation into the application of social
media. Enterp. Inf. Syst. 2023, 17, 2188122. [CrossRef]
47. Kannelønning, K.; Katsikas, S.K. A systematic literature review of how cybersecurity-related behavior has been assessed. Inf.
Comput. Secur. 2023. [CrossRef]
48. Al-Saedi, K.; Al-Emran, M. A Systematic Review of Mobile Payment Studies from the Lens of the UTAUT Model. In Recent
Advances in Technology Acceptance Models and Theories; Springer: Cham, Switzerland, 2021; Volume 335, pp. 79–106.
49. Marangunić, N.; Granić, A. Technology acceptance model: A literature review from 1986 to 2013. Univers. Access Inf. Soc. 2015, 14,
81–95. [CrossRef]
50. Fatehah, M.; Mezhuyev, V.; Al-Emran, M. A Systematic Review of Metamodelling in Software Engineering. In Recent Advances in
Intelligent Systems and Smart Applications; Springer: Berlin/Heidelberg, Germany, 2021; pp. 3–27.
51. Al-Qaysi, N.; Granić, A.; Al-Emran, M.; Ramayah, T.; Garces, E.; Daim, T.U. Social media adoption in education: A systematic
review of disciplines, applications, and influential factors. Technol. Soc. 2023, 73, 102249. [CrossRef]
52. Kitchenham, B.; Charters, S. Guidelines for Performing Systematic Literature Reviews in Software Engineering; Software Engineering
Group, School of Computer Science and Mathematics, Keele University: Newcastle, UK, 2007; pp. 1–57.
53. Costa, V.; Monteiro, S. Key knowledge management processes for innovation: A systematic literature review. VINE J. Inf. Knowl.
Manag. Syst. 2016, 46, 386–410. [CrossRef]
54. Alqahtani, H.; Kavakli-Thorne, M. Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?
In HCI for Cybersecurity, Privacy and Trust; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; Volume 12210,
ISBN 9783030503086.
55. Addae, J.H.; Sun, X.; Towey, D.; Radenkovic, M. Exploring user behavioral data for adaptive cybersecurity. User Model. User-Adapt.
Interact. 2019, 29, 701–750. [CrossRef]
56. Blythe, J.M.; Coventry, L. Costly but effective: Comparing the factors that influence employee anti-malware behaviours. Comput.
Hum. Behav. 2018, 87, 87–97. [CrossRef]
57. Al-Emran, M.; AlQudah, A.A.; Abbasi, G.A.; Al-Sharafi, M.A.; Iranmanesh, M. Determinants of Using AI-Based Chatbots for
Knowledge Sharing: Evidence From PLS-SEM and Fuzzy Sets (fsQCA). IEEE Trans. Eng. Manag. 2023. [CrossRef]
Appl. Sci. 2023, 13, 5700 30 of 32
58. Gillam, A.R.; Foster, W.T. Factors affecting risky cybersecurity behaviors by U.S. workers: An exploratory study. Comput. Hum.
Behav. 2020, 108, 106319. [CrossRef]
59. Young, D.; Carpenter, D.; McLeod, A. Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance
Replication. AIS Trans. Replication Res. 2016, 2, 1–17. [CrossRef]
60. Shahbaznezhad, H.; Kolini, F.; Rashidirad, M. Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and
Technological Factors Matter? J. Comput. Inf. Syst. 2020, 61, 539–550. [CrossRef]
61. Vafaei-Zadeh, A.; Thurasamy, R.; Hanifah, H. Modeling anti-malware use intention of university students in a developing country
using the theory of planned behavior. Kybernetes 2019, 48, 1565–1585. [CrossRef]
62. Al-Emran, M.; Al-Nuaimi, M.N.; Arpaci, I.; Al-Sharafi, M.A.; Anthony Jnr, B. Towards a wearable education: Understanding the
determinants affecting students’ adoption of wearable technologies using machine learning algorithms. Educ. Inf. Technol. 2022,
28, 2727–2746. [CrossRef]
63. Fatokun, F.B.; Hamid, S.; Norman, A.; Fatokun, J.O. The Impact of Age, Gender, and Educational level on the Cybersecurity
Behaviors of Tertiary Institution Students: An Empirical investigation on Malaysian Universities. J. Phys. Conf. Ser. 2019,
1339, 12098. [CrossRef]
64. Li, L.; He, W.; Xu, L.; Ash, I.; Anwar, M.; Yuan, X. Investigating the impact of cybersecurity policy awareness on employees’
cybersecurity behavior. Int. J. Inf. Manag. 2019, 45, 13–24. [CrossRef]
65. Ryle, P.; Yan, J.; Gardiner, L.R. Gramm-Leach-Bliley Gets a Systems Upgrade: What the Ftc’S Proposed Safeguards Rule Changes
Mean for Small and Medium American Financial Institutions. EDPACS 2022, 65, 6–17. [CrossRef]
66. Buzan, T. Tony Buzan|Inventor of Mind Mapping.
67. Al-Qaysi, N.; Mohamad-Nordin, N.; Al-Emran, M. What leads to social learning? Students’ attitudes towards using social media
applications in Omani higher education. Educ. Inf. Technol. 2020, 25, 2157–2174. [CrossRef]
68. Al-Qaysi, N.; Mohamad-Nordin, N.; Al-Emran, M.; Al-Sharafi, M.A. Understanding the differences in students’ attitudes towards
social media use: A case study from Oman. In Proceedings of the 2019 IEEE Student Conference on Research and Development
(SCOReD), Bandar Seri Iskandar, Malaysia, 15–17 October 2019; pp. 176–179.
69. Jain, A.K.; Sahoo, S.R.; Kaubiyal, J. Online social networks security and privacy: Comprehensive review and analysis. Complex
Intell. Syst. 2021, 7, 2157–2177. [CrossRef]
70. Addae, J.H.; Brown, M.; Sun, X.; Towey, D.; Radenkovic, M. Measuring attitude towards personal data for adaptive cybersecurity.
Inf. Comput. Secur. 2017, 25, 560–579. [CrossRef]
71. Van der Schyff, K.; Flowerday, S. Mediating effects of information security awareness. Comput. Secur. 2021, 106, 102313. [CrossRef]
72. Van Schaik, P.; Renaud, K.; Wilson, C.; Jansen, J.; Onibokun, J. Risk as affect: The affect heuristic in cybersecurity. Comput. Secur.
2020, 90, 101651. [CrossRef]
73. Varshney, G.; Misra, M.; Atrey, P. Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension
based phishing attacks. J. Inf. Secur. Appl. 2018, 42, 1–17. [CrossRef]
74. Gratian, M.; Bandi, S.; Cukier, M.; Dykstra, J.; Ginther, A. Correlating human traits and cyber security behavior intentions. Comput.
Secur. 2018, 73, 345–358. [CrossRef]
75. Fischer, E.A. Cybersecurity Issues and Challenges: In Brief ; Congressional Research Service: Washington, DC, USA, 2016.
76. Cybint 15 Alarming Cyber Security Facts and Stats. Available online: https://www.cybintsolutions.com/cyber-security-facts-
stats/ (accessed on 28 October 2021).
77. Proofpoint. An In-Depth Look at User Awareness, Vulnerability and Resilience; Proofpoint: Sunnyvale, CA, USA, 2020.
78. Katsikeas, S.; Johnson, P.; Ekstedt, M.; Lagerström, R. Research communities in cyber security: A comprehensive literature review.
Comput. Sci. Rev. 2021, 42, 100431. [CrossRef]
79. Al-Emran, M.; Granić, A.; Al-Sharafi, M.A.; Ameen, N.; Sarrab, M. Examining the roles of students’ beliefs and security concerns
for using smartwatches in higher education. J. Enterp. Inf. Manag. 2021, 34, 1229–1251. [CrossRef]
80. Simonet, J.; Teufel, S. The influence of organizational, social and personal factors on cybersecurity awareness and behavior of
home computer users. IFIP Adv. Inf. Commun. Technol. 2019, 562, 194–208. [CrossRef]
81. Ameen, N.; Tarhini, A.; Shah, M.H.; Madichie, N.; Paul, J.; Choudrie, J. Keeping customers’ data secure: A cross-cultural study of
cybersecurity compliance among the Gen-Mobile workforce. Comput. Hum. Behav. 2021, 114, 106531. [CrossRef]
82. Ameen, N.; Tarhini, A.; Shah, M.H.; Madichie, N.O.; Hussain Shah, M.; Madichie, N.O. Employees’ behavioural intention to
smartphone security: A gender-based, cross-national study. Comput. Hum. Behav. 2020, 104, 106184. [CrossRef]
83. Gillam, A.R.; Waite, A.M. Gender differences in predictors of technology threat avoidance. Inf. Comput. Secur. 2021, 29, 393–412.
[CrossRef]
84. Anwar, M.; We, H.; Ash, I.; Yuan, X.; Li, L.; Xu, L. Gender Difference and Employees’ Cybersecurity Behaviors. Comput. Hum.
Behav. 2017, 69, 437–443. [CrossRef]
85. Alsharida, R.A.; Al-rimy, B.A.S.; Al-Emran, M.; Zainal, A. A systematic review of multi perspectives on human cybersecurity
behavior. Technol. Soc. 2023, 73, 102258. [CrossRef]
86. Alshaikh, M.; Adamson, B. From awareness to influence: Toward a model for improving employees’ security behaviour. Pers.
Ubiquitous Comput. 2021, 25, 829–841. [CrossRef]
87. Bansal, G.; Muzatko, S.; Shin, S. Il Information system security policy noncompliance: The role of situation-specific ethical
orientation. Inf. Technol. People 2021, 34, 250–296. [CrossRef]
Appl. Sci. 2023, 13, 5700 31 of 32
88. Li, Y.; Pan, T.; Zhang, N. From hindrance to challenge: How employees understand and respond to information security policies.
J. Enterp. Inf. Manag. 2020, 33, 191–213. [CrossRef]
89. Alqahtani, H.; Kavakli-Thorne, M.; Alrowaily, M. The Impact of Gamification Factor in the Acceptance of Cybersecurity
Awareness Augmented Reality Game (Cybar). In HCI for Cybersecurity, Privacy and Trust; Springer International Publishing:
Berlin/Heidelberg, Germany, 2020; Volume 12210, ISBN 9783030503086.
90. Abroshan, H.; Devos, J.; Poels, G.; Laermans, E. Phishing Happens beyond Technology: The Effects of Human Behaviors and
Demographics on Each Step of a Phishing Process. IEEE Access 2021, 9, 44928–44949. [CrossRef]
91. Xu, Z.; Guo, K. It ain’t my business: A coping perspective on employee effortful security behavior. J. Enterp. Inf. Manag. 2019, 32,
824–842. [CrossRef]
92. Verkijika, S.F. Employees’ Cybersecurity Behaviour in the Mobile Context: The Role of Self-Efficacy and Psychological Ownership.
In Proceedings of the 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC),
Kimberley, South Africa, 25–27 November 2020. [CrossRef]
93. Jeske, D.; van Schaik, P. Familiarity with Internet threats: Beyond awareness. Comput. Secur. 2017, 66, 129–141. [CrossRef]
94. Verkijika, S.F. “If you know what to do, will you take action to avoid mobile phishing attacks”: Self-efficacy, anticipated regret,
and gender. Comput. Hum. Behav. 2019, 101, 286–296. [CrossRef]
95. Packetlabs Cybersecurity Statistics for 2021. Available online: https://www.packetlabs.net/cybersecurity-statistics-2021/
(accessed on 29 October 2021).
96. ACSC. ACSC Annual Cyber Threat Report 2020–21. Available online: https://www.cyber.gov.au/acsc/view-all-content/reports-
and-statistics/acsc-annual-cyber-threat-report-2020-21 (accessed on 29 October 2021).
97. Chou, H.L.; Chou, C. A quantitative analysis of factors related to Taiwan teenagers’ smartphone addiction tendency using a
random sample of parent-child dyads. Comput. Hum. Behav. 2019, 99, 335–344. [CrossRef]
98. Sivarethinamohan, R.; Sujatha, S. Behavioral Intentions towards adoption of Information Protection and Cyber security (Email
Security and Online Privacy): SEM model. Turk. J. Comput. Math. Educ. 2021, 12, 56–68. [CrossRef]
99. Donalds, C.; Osei-Bryson, K.M. Cybersecurity compliance behavior: Exploring the influences of individual decision style and
other antecedents. Int. J. Inf. Manag. 2020, 51, 102056. [CrossRef]
100. Liu, C.; Liang, H.; Wang, N.; Xue, Y. Ensuring employees’ information security policy compliance by carrot and stick: The moder-
ating roles of organizational commitment and gender. Inf. Technol. People 2021, 35, 802–834. [CrossRef]
101. Reeves, A.; Parsons, K.; Calic, D. Whose risk is it anyway: How do risk perception and organisational commitment affect
employee information security awareness? In Proceedings of the International Conference on Human-Computer Interaction,
Copenhagen, Denmark, 19–24 July 2020; Springer: Cham, Switzerland, 2020; pp. 232–249.
102. Sun, H.; Zhang, P. The role of moderating factors in user technology acceptance. Int. J. Hum. Comput. Stud. 2006, 64, 53–78.
[CrossRef]
103. Arpaci, I.; Huang, S.; Al-Emran, M.; Al-Kabi, M.N.; Peng, M. Predicting the COVID-19 infection with fourteen clinical features
using machine learning classification algorithms. Multimed. Tools Appl. 2021, 80, 11943–11957. [CrossRef]
104. Zaza, S.; Al-Emran, M. Mining and exploration of credit cards data in UAE. In Proceedings of the 2015 5th International
Conference on e-Learning, ECONF 2015, Manama, Bahrain, 18–20 October 2015; IEEE: New York, NY, USA, 2015; pp. 275–279.
105. Mijwil, M.M.; Salem, I.E.; Ismaeel, M.M. The Significance of Machine Learning and Deep Learning Techniques in Cybersecurity:
A Comprehensive Review. Iraqi J. Comput. Sci. Math. 2023, 4, 87–101. [CrossRef]
106. Pattnaik, N.; Li, S.; Nurse, J.R.C. Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions
on twitter. Comput. Secur. 2023, 125, 103008. [CrossRef]
107. Liu, B.; Wei, L. Unintended effects of open data policy in online behavioral research: An experimental investigation of participants’
privacy concerns and research validity. Comput. Hum. Behav. 2023, 139, 107537. [CrossRef]
108. Lin, W.; Xu, M.; He, J.; Zhang, W. Privacy, security and resilience in mobile healthcare applications. Enterp. Inf. Syst. 2023, 17,
1–15. [CrossRef]
109. Huang, Y.; Li, Y.J.; Cai, Z. Security and Privacy in Metaverse: A Comprehensive Survey. Big Data Min. Anal. 2023, 6, 234–247.
[CrossRef]
110. Koohang, A.; Nord, J.; Ooi, K.; Tan, G.; Al-Emran, M.; Aw, E.; Baabdullah, A.; Buhalis, D.; Cham, T.; Dennis, C.; et al. Shaping
the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future
Investigation. J. Comput. Inf. Syst. 2023, 63, 735–765. [CrossRef]
111. Hong, W.C.H.; Chi, C.Y.; Liu, J.; Zhang, Y.F.; Lei, V.N.L.; Xu, X.S. The Influence of Social Education Level on Cybersecurity
Awareness and Behaviour: A Comparative Study of University Students and Working Graduates. Educ. Inf. Technol. 2023, 28,
439–470. [CrossRef]
112. Limna, P.; Siripipattanakul, S. The Relationship between Cyber Security Knowledge, Awareness and Behavioural Choice
Protection among Mobile Banking Users in Thailand. Int. J. Comput. Sci. Res. 2022, 7, 1–19. [CrossRef]
113. Rohan, R.; Pal, D.; Hautamäki, J.; Funilkul, S.; Chutimaskul, W.; Thapliyal, H. A systematic literature review of cybersecurity
scales assessing information security awareness. Heliyon 2023, 9, e14234. [CrossRef]
114. Ahmad, Z.; Ong, T.S.; Liew, T.H.; Norhashim, M. Security monitoring and information security assurance behaviour among
employees: An empirical analysis. Inf. Comput. Secur. 2019, 27, 165–188. [CrossRef]
Appl. Sci. 2023, 13, 5700 32 of 32
115. Vafaei-Zadeh, A.; Ramayah, T.; Wong, W.P.; Md Hanifah, H. Modelling internet security software usage among undergraduate
students: A necessity in an increasingly networked world. VINE J. Inf. Knowl. Manag. Syst. 2018, 48, 2–20. [CrossRef]
116. Kianpour, M.; Øverby, H.; Kowalski, S.J.; Frantz, C. Social Preferences in Decision Making Under Cybersecurity Risks and
Uncertainties. In HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science (Including Subseries Lecture Notes
in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer: Berlin/Heidelberg, Germany, 2019; Volume 11594,
pp. 149–163. [CrossRef]
117. Aigbefo, Q.A.; Blount, Y.; Marrone, M. The influence of hardiness and habit on security behaviour intention. Behav. Inf. Technol.
2020, 41, 1151–1170. [CrossRef]
118. Li, L.; He, W.; Xu, L.; Ivan, A.; Anwar, M.; Yuan, X. Does explicit information security policy affect employees’ cyber secu-
rity behavior? A pilot study. In Proceedings of the 2nd International Conference on Enterprise Systems, Shanghai, China,
2–3 August 2014; pp. 169–173. [CrossRef]
119. Anwar, M.; He, W.; Yuan, X. Employment status and cybersecurity behaviors. In Proceedings of the 2016 International
Conference on Behavioral, Economic and Socio-Cultural Computing (BESC), Durham, NC, USA, 11–13 November 2016; IEEE:
New York, NY, USA, 2016; pp. 1–2.
120. Alghamdi, M.I. Determining the impact of cyber security awareness on employee behaviour: A case of Saudi Arabia. Mater. Today
Proc. 2021. [CrossRef]
121. McBride, M.; Carter, L.; Warkentin, M. Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance
with Cybersecurity Policies; RTI International: Research Triangle Park, NC, USA, 2012; ISBN 3312021278.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.