Show simple item record

dc.contributor.authorLi, Ying
dc.contributor.authorXin, Tong
dc.contributor.authorSiponen, Mikko
dc.date.accessioned2021-11-08T11:47:46Z
dc.date.available2021-11-08T11:47:46Z
dc.date.issued2022
dc.identifier.citationLi, Y., Xin, T., & Siponen, M. (2022). Citizens' Cybersecurity Behavior : Some Major Challenges. <i>IEEE Security & Privacy</i>, <i>20</i>(1), 54-61. <a href="https://doi.org/10.1109/MSEC.2021.3117371" target="_blank">https://doi.org/10.1109/MSEC.2021.3117371</a>
dc.identifier.otherCONVID_101719849
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/78537
dc.description.abstractCitizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.ispartofseriesIEEE Security & Privacy
dc.rightsIn Copyright
dc.titleCitizens' Cybersecurity Behavior : Some Major Challenges
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202111085560
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringfi
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineEmpirical Cyber Security and Software Engineeringen
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.description.reviewstatuspeerReviewed
dc.format.pagerange54-61
dc.relation.issn1540-7993
dc.relation.numberinseries1
dc.relation.volume20
dc.type.versionacceptedVersion
dc.rights.copyright© 2021 IEEE
dc.rights.accesslevelopenAccessfi
dc.subject.ysohakkerointi
dc.subject.ysoInternet
dc.subject.ysouhat
dc.subject.ysovaikuttaminen
dc.subject.ysoturvallisuus
dc.subject.ysoorganisaatiot
dc.subject.ysoetätyö
dc.subject.ysokyberturvallisuus
dc.subject.ysokansalaiset
dc.subject.ysotietoturva
dc.subject.ysoverkkohyökkäykset
dc.subject.ysotietoturvapolitiikka
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p16687
jyx.subject.urihttp://www.yso.fi/onto/yso/p20405
jyx.subject.urihttp://www.yso.fi/onto/yso/p21206
jyx.subject.urihttp://www.yso.fi/onto/yso/p1657
jyx.subject.urihttp://www.yso.fi/onto/yso/p7349
jyx.subject.urihttp://www.yso.fi/onto/yso/p272
jyx.subject.urihttp://www.yso.fi/onto/yso/p10801
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p16359
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1109/MSEC.2021.3117371
jyx.fundinginformationThis study was funded by the National Social Science Fund of China (18CGL045).


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright