INFORMAZIONI SU QUESTO ARTICOLO

Cita

Aldasoro, I., Frost, J., Gambacorta, L., & Whyte, D. (2021, January). Covid-19 and cyber risk in the financial sector. BIS Bulletin, 37, 1–9. Search in Google Scholar

Anwar, M., He, W., Ash, I., Yuan, X., Li, L., & Xu, L. (2017). Gender difference and employees’ cybersecurity behaviors. Computers in Human Behavior, 69, 437–443.10.1016/j.chb.2016.12.040 Search in Google Scholar

Association of Certified Fraud Examiners. (2020, December). Fraud in the wake of COVID-19: Benchmarking report. Search in Google Scholar

Bada, M., Sasse, A. M., & Nurse, J.R.C. (2015). Cyber security awareness campaigns: Why do they fail to change behaviour?. (Paper presented at the 1st International Conference on Cyber Security for Sustainable Society). Sustainable Society Network, 118–131. Search in Google Scholar

Boss, S. R., Kirsch, L. J., Angermeier, I., Shingler, R. A., & Boss, R. W. (2009). If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security. European Journal of Information Systems, 18(2), 151–164.10.1057/ejis.2009.8 Search in Google Scholar

Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45.10.1016/j.jisa.2018.08.002 Search in Google Scholar

Chandarman, R., & Van Niekerk, B. (2017). Students’ cybersecurity awareness at a private tertiary educational institution. The African Journal of Information and Communication, 20, 133–155.10.23962/10539/23572 Search in Google Scholar

Chłoń-Domińczak, A., & Kotowska, I. E. (Eds.). (2015). Uwarunkowania decyzji edukacyjnych. Warszawa: Instytut Badań Edukacyjnych. Search in Google Scholar

Da Veiga, A. (2018). An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. Information & Computer Security, 26(5), 584–612.10.1108/ICS-08-2017-0056 Search in Google Scholar

Dvorak, T., & Hanley, H. (2010). Financial literacy and the design of retirement plans. The Journal of Socio-Economics, 39(6), 645–652.10.1016/j.socec.2010.06.013 Search in Google Scholar

ESRB. (2018). Press release: The general board of the European Systemic Risk Board held its 32nd regular meeting on 6 Dec 2018. Search in Google Scholar

Frijns, B., Gilbert, A., & Tourani-Rad, A. (2014). Learning by doing: The role of financial experience in financial literacy. Journal of Public Policy, 34(1), 123–154.10.1017/S0143814X13000275 Search in Google Scholar

Georgiadou, A., Mouzakitis, S., Bounas, K., & Askounis, D. (2020). A cyber-security culture framework for assessing organization readiness. Journal of Computer Information Systems, 1–11.10.1080/08874417.2020.1845583 Search in Google Scholar

Grazioli, S., & Wang, A. (2001). Looking without seeing: Understanding unsophisticated consumers’ success and failure to detect Internet deception. (ICIS 2001 Proceedings, 193–203). Search in Google Scholar

Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: A framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106–125.10.1057/ejis.2009.6 Search in Google Scholar

Hosany, S., & Martin, D. (2012). Self-image congruence in consumer behavior. Journal of Business Research, 65(5), 685–691.10.1016/j.jbusres.2011.03.015 Search in Google Scholar

Hughes-Larteya, K., Li, M., Botchey, F. E., & Qin, Z. (2021). Human factor, a critical weak point in the information security of an organization’s Internet of things. Heliyon, 7(3), 1–13.10.1016/j.heliyon.2021.e06522 Search in Google Scholar

Hussain, A., Mohamed, A., & Razali, S. (2020). A review on cybersecurity: Challenges & emerging threats. (NISS2020: Proceedings of the 3rd International Conference on Networking, Information Systems & Security No. 28, 1–7). Search in Google Scholar

Junger, M., Montoya, & L., Overink, F.-J. (2017). Priming and warnings are not effective to prevent social engineering attacks. Computers in Human Behavior, 66, 75–87.10.1016/j.chb.2016.09.012 Search in Google Scholar

Kennison, S. M., & Chan-Tin, E. (2020). Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Frontiers in Psychology, 11, 1–9.10.3389/fpsyg.2020.546546 Search in Google Scholar

Kostyuk, N., & Wayne, C. (2021). The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public. Journal of Global Security Studies, 6(2), 1–25.10.1093/jogss/ogz077 Search in Google Scholar

Kosub, T. (2015). Components and challenges of integrated cyber risk management. Zeitschrift für die gesamte Versicherungswissenschaft, 104, 615–634.10.1007/s12297-015-0316-8 Search in Google Scholar

Krol, K., Moroz, M., & Sasse, M. A. (2012). Don’t work. Can’t work? Why it’s time to rethink security warnings. (Paper presented at the 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), 1–8). Search in Google Scholar

Li, H., Xie, K. L., & Zhang, Z. (2020). The effects of consumer experience and disconfirmation on the timing of online review: Field evidence from the restaurant business. International Journal of Hospitality Management, 84, 1–11.10.1016/j.ijhm.2019.102344 Search in Google Scholar

Lis, P., & Mendel, J. (2019). Cyberattacks on critical infrastructure: An economic perspective. Economics and Business Review, 5(2), 24–47.10.18559/ebr.2019.2.2 Search in Google Scholar

Lusardi, A., & Tufano, P. (2015). Debt literacy, financial experiences, and overindebtedness. Journal of Pension Economics and Finance, 14(4), 332–368.10.1017/S1474747215000232 Search in Google Scholar

Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32–44.10.1016/j.chb.2018.01.028 Search in Google Scholar

Mashiane, T., & Kritzinger, E. (2018). Cybersecurity behaviour: A conceptual taxonomy. In: O. Blazy, C. Y. Yeun (Eds.), Information security. Theory and practice. (12th IFIP WG 11.2 International Conference, WISTP, 147–156). Search in Google Scholar

Mashiane, T., & Kritzinger, E. (2021). Identifying behavioral constructs in relation to user cybersecurity behavior. Eurasian Journal of Social Sciences, 9(2), 98–122.10.15604/ejss.2021.09.02.004 Search in Google Scholar

McKinsey. (2020). Digital challengers in the next normal in Central and Eastern Europe on a path to digitally-led growth. McKinsey Digital. Search in Google Scholar

Milošević, N., Dobrota, M., & Barjaktarović Rakočević, S. (2018). Digital economy in Europe: Evaluation of countries’ performances. Proceedings of Rijeka Faculty of Economics: Journal of Economics and Business, 36(2), 861–880. Search in Google Scholar

Mruk, C. J. (2006). Self-esteem research, theory, and practice: Toward a positive psychology of self-esteem. New York: Springer Publishing Company. Search in Google Scholar

Naidoo, R. (2020). A multi-level influence model of COVID-19 themed cybercrime. European Journal of Information Systems, 29(3), 306–321.10.1080/0960085X.2020.1771222 Search in Google Scholar

Olmstead, K., & Smith, A. (2017, March 22). What the public knows about cybersecurity. Pew Research Center. Search in Google Scholar

Parsons, K. M., Young, E., Butavicius, M. A., McCormac, A., Pattinson, M., & Jerram, C. (2015). The influence of organizational information security culture on information security decision making. Journal of Cognitive Engineering and Decision Making, 9(2), 117–129.10.1177/1555343415575152 Search in Google Scholar

Reegård, K., Blackett, C., & Katta, V. (2019). The concept of cybersecurity culture. (Paper presented on the 29th European Safety and Reliability Conference).10.3850/978-981-11-2724-3_0761-cd Search in Google Scholar

Shillair, R., Cotton, S. R., Tsai, H.-Y. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2005). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199–207.10.1016/j.chb.2015.01.046 Search in Google Scholar

Tedder, K. (2020). The escalation of digital fraud: Global impact of the coronavirus. Report by Javelin Strategy & Research and SAS. Search in Google Scholar

Van Rooij, M., Lusardi, A., & Alessie, R. (2011a). Financial literacy and stock market participation. Journal of Financial Economics, 101(2), 449–-472.10.1016/j.jfineco.2011.03.006 Search in Google Scholar

Van Rooij, M., Lusardi, A., & Alessie, R. (2011b). Financial literacy and retirement planning in the Netherlands. Journal of Economic Psychology, 32(4), 593–608.10.1016/j.joep.2011.02.004 Search in Google Scholar

Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from habit and protection motivation theory. Information & Management, 49(3), 190–198.10.1016/j.im.2012.04.002 Search in Google Scholar

Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s”. Heliyon, 5(12), 1–8.10.1016/j.heliyon.2019.e02855 Search in Google Scholar

Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers & Security, 38, 97–102.10.1016/j.cose.2013.04.004 Search in Google Scholar

Watanapongvanich, S., Binnagan, P., Putthinun, P., Khan, M. S. R., & Kadoya, Y. (2021). Financial literacy and gambling behavior: Evidence from Japan. Journal of Gambling Studies, 37(3), 445–465.10.1007/s10899-020-09936-3 Search in Google Scholar

Wogalter, M. S., Laughery, Sr. K. R., & Mayhorn, C. B. (2012). Warnings and hazard communications. In: G. Salvendy (Ed.), Handbook of human factors and ergonomics (4 ed., pp. 868–894). Hoboken, NJ: John Wiley & Sons. Search in Google Scholar

Yasin, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Information and Software Technology, 95, 179–200.10.1016/j.infsof.2017.12.002 Search in Google Scholar

Yildirim, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18, 741–759.10.1007/s10207-019-00429-y Search in Google Scholar

Związek Banków Polskich (ZBP). (2021). Postawy Polaków wobec cyberbezpieczeństwa. Badanie Warszawskiego Instytutu Bankowości zrealizowane w ramach projektu Bezpieczeństwo w Cyberprzestrzeni. Retrieved from https://zbp.pl/getmedia/65f267e4-3316-4198-9cce-411d8f03de32/Postawy_Polakow_wobec_Cyberbezpieczenstwa_v-3 Search in Google Scholar

Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 1–16. Search in Google Scholar

eISSN:
2450-0097
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Business and Economics, Political Economics, other, Finance, Mathematics and Statistics for Economists, Econometrics