You are currently on the new version of our website. Access the old version .

89 Results Found

  • Article
  • Open Access
1 Citations
3,968 Views
17 Pages

22 August 2023

Information systems misuse and data breaches are among the most common information security threats at the organisational and individual levels. Security, Education, Training and Awareness (SETA) program can be effective tools in addressing and preve...

  • Article
  • Open Access
43 Citations
10,117 Views
16 Pages

31 March 2022

Digital technologies play a vital role in daily human life and significantly influence human attitudes toward the adoption of new and attractive lifestyles. The internet has been widely accepted in every modern society, and the act of purchasing prod...

  • Article
  • Open Access
4 Citations
7,998 Views
35 Pages

The rise in internet-based services has raised risks of data exposure. The manipulation and exploitation of sensitive data significantly impact individuals’ resilience—the ability to protect and prepare against cyber incidents. Emerging t...

  • Article
  • Open Access
28 Citations
12,416 Views
9 Pages

Security Perception of IoT Devices in Smart Homes

  • Lili Nemec Zlatolas,
  • Nataša Feher and
  • Marko Hölbl

14 February 2022

IoT devices are used frequently in smart homes. To better understand how users perceive the security of IoT devices in their smart homes, a model was developed and tested with multiple linear regression. A total of 306 participants participated in th...

  • Article
  • Open Access
1 Citations
1,307 Views
25 Pages

1 August 2024

Although collective forest tenure reform (CFTR) has improved the legal tenure security of forestland, its impact on increasing farmers’ income is unsustainable. This study used a multiple linear regression model to empirically analyze data from...

  • Article
  • Open Access
4 Citations
3,820 Views
19 Pages

Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables

  • Zauwiyah Ahmad,
  • Thian Song Ong,
  • Yen Wen Gan,
  • Tze Hui Liew and
  • Mariati Norhashim

21 April 2022

Personal mobile devices form an integral part of business activities today. Mobile devices, nevertheless, pose various security issues and data privacy threats, which require a close attention. The rational choice theory was utilized to examine the d...

  • Article
  • Open Access
3,948 Views
10 Pages

13 June 2024

Research has extensively studied adult attachment theory, a fundamental psychological framework, particularly regarding its implications for adult attachment and sexual dynamics. The previous literature has established relationships between adult att...

  • Article
  • Open Access
5 Citations
1,503 Views
14 Pages

4 September 2023

This paper examines the distinct effects of actual and perceived security on forestland investment by rural households. To achieve this, we utilized Tobit and IV-Reg models to analyze repeated survey data from 500 households residing in 50 villages i...

  • Article
  • Open Access
25 Citations
5,848 Views
20 Pages

30 March 2023

In the post pandemic era, the telecommuting of business employees has widely become acceptable in organizations, which demands extensive dependence on digital technologies. In addition, this poses additional security threats for business employees as...

  • Article
  • Open Access
47 Citations
6,476 Views
28 Pages

Sustainable Applications of Smart-Government Services: A Model to Understand Smart-Government Adoption

  • Ahmad Althunibat,
  • Muhammad Binsawad,
  • Mohammed Amin Almaiah,
  • Omar Almomani,
  • Adeeb Alsaaidah,
  • Waleed Al-Rahmi and
  • Mohamed Elhassan Seliaman

10 March 2021

Despite the fact that several studies have been conducted to study the adoption of smart-government services, little consideration has been paid to exploring the main factors that influence the adoption of smart-government services at the three main...

  • Article
  • Open Access
6,086 Views
30 Pages

27 March 2025

Smart home technologies (SHT) offer numerous benefits to consumers. This study explored the relationship between the perceived benefits of and the likelihood of subsequently purchasing SHT among Taiwanese consumers. The study conducted a survey in Ma...

  • Article
  • Open Access
3 Citations
2,654 Views
15 Pages

13 December 2024

This study investigates the impact of workplace physical hazards on job satisfaction in the construction industry, focusing on the mediating role of mental threats and the moderating effects of perceived job quality and security. The study findings i...

  • Review
  • Open Access
108 Citations
24,719 Views
38 Pages

9 April 2021

A grave concern to an organization’s information security is employees’ behavior when they do not value information security policy compliance (ISPC). Most ISPC studies evaluate compliance and noncompliance behaviors separately. However, the literatu...

  • Article
  • Open Access
23 Citations
8,925 Views
25 Pages

14 April 2020

This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships w...

  • Review
  • Open Access
2 Citations
5,468 Views
32 Pages

Privacy and Security in Digital Health Contact-Tracing: A Narrative Review

  • Shehani Pigera,
  • Paul van Schaik,
  • Karen Renaud,
  • Miglena Campbell,
  • Petra Manley and
  • Pierre Esser

16 January 2025

(1) Background: Contact-tracing apps only achieve their aims if the majority of the population installs and actively engages with them. Such acceptance depends on public perceptions and are likely influenced by privacy and security concerns. Therefor...

  • Article
  • Open Access
8 Citations
7,127 Views
18 Pages

Investigating Accessibility of Social Security System (SSS) Mobile Application: A Structural Equation Modeling Approach

  • Yung-Tsan Jou,
  • Klint Allen Mariñas,
  • Charmine Sheena Saflor and
  • Michael Nayat Young

29 June 2022

Due to the Philippines’ current condition in COVID-19, the Social Security System (SSS) has launched a mobile app as an intervention for walk-in appointments and another convenient way to exchange information. By integrating the extended Techno...

  • Article
  • Open Access
14 Citations
11,893 Views
21 Pages

BYOD Security: A Study of Human Dimensions

  • Kathleen Downer and
  • Maumita Bhattacharya

The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemi...

  • Article
  • Open Access
9 Citations
5,914 Views
16 Pages

User Modelling Validation over the Security Awareness of Digital Natives

  • Vasileios Gkioulos,
  • Gaute Wangen and
  • Sokratis K. Katsikas

Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A pl...

  • Article
  • Open Access
28 Citations
10,293 Views
16 Pages

1 October 2019

At present, tourism is a key component of the modern Vietnamese economy. However, it is increasing the country’s pitifully low return visitor rate. The aim of this study was to explore the structural relationships among destination attributes,...

  • Article
  • Open Access
1 Citations
3,377 Views
29 Pages

22 August 2024

The physical and spatial environment of a city is closely related to the general well-being of residents and their psychological security. The study aimed to examine the relationship between the physical and spatial urban environment and psychologica...

  • Article
  • Open Access
2 Citations
1,156 Views
17 Pages

17 February 2025

With the continuous development of information technology, network security risks are also rising, and the ability to quickly perceive network threats has become an important prerequisite and an important means to cope with network risks. Currently,...

  • Article
  • Open Access
3,819 Views
13 Pages

20 August 2024

Blockchain technology is now an advanced and innovative database technology and the attributes of blockchains are apparent in a variety of industries, especially in the financial industry. One of the most famous blockchain use cases, cryptocurrencies...

  • Article
  • Open Access
5,305 Views
17 Pages

Cryptocurrencies as a Tool for Money Laundering: Risk Assessment and Perception of Threats Based on Empirical Research

  • Marta Spyra,
  • Rafał Balina,
  • Marta Idasz-Balina,
  • Adam Zając and
  • Filip Różyński

2 October 2025

As the global economy undergoes rapid digital transformation, cryptocurrencies have emerged as a prominent alternative class of financial assets. Their decentralized nature, pseudonymity, and lack of centralized oversight have attracted considerable...

  • Article
  • Open Access
24 Citations
4,550 Views
15 Pages

11 May 2023

One of the most essential elements of environmental protection is an appropriate policy towards carbon capture, utilisation, and storage (CCUS). On the one hand, these technologies are being dynamically developed. Still, on the other hand, we often e...

  • Article
  • Open Access
10 Citations
6,710 Views
12 Pages

21 March 2025

With the development of artificial intelligence (AI) in the working environment, employees’ AI awareness, defined as the extent to which they perceive their job could be replaced by AI, may correlate with their feelings, work–family balan...

  • Article
  • Open Access
1,321 Views
22 Pages

Predictors of Digital Fraud: Evidence from Thailand

  • Tanpat Kraiwanit,
  • Pongsakorn Limna,
  • Rattaphong Sonsuphap and
  • Veraphong Chutipat

This study examined the complex interplay of demographic characteristics, behavioral patterns, and technological factors that contribute to digital fraud victimization within the context of a developing economy, focusing specifically on Thailand. Uti...

  • Article
  • Open Access
15 Citations
5,569 Views
24 Pages

27 October 2022

Key food production sectors, such as fisheries, are predicted to be severely impacted by climate change, which threatens food security. Owing to the direct influence of climate change on the lives and means of livelihood of marine fishing communities...

  • Article
  • Open Access
1 Citations
1,300 Views
15 Pages

The purposes of this study were to determine whether perceived food insecurity significantly influences food purchasing behaviors, food preparation practices, and life satisfaction; and to verify the moderating effect of generation in South Korea. St...

  • Article
  • Open Access
7 Citations
4,186 Views
12 Pages

Perception of the Regulatory Change for Zolpidem Prescription by French General Practitioners and Its Relation to Prescription Behavior

  • Edouard-Jules Laforgue,
  • Marion Istvan,
  • Benoit Schreck,
  • Marie Mainguy,
  • Pascale Jolliet,
  • Marie Grall-Bronnec and
  • Caroline Victorri-Vigneau

13 April 2022

Background: To “limit the risk of abuse and misuse” and “encourage correct usage”, the French drug regulatory authority stated that—from April 2017—zolpidem prescription must be performed on a secured prescription...

  • Article
  • Open Access
36 Citations
6,760 Views
14 Pages

13 March 2017

This study evaluates the socio-economic predictors of farmers’ perceptions about climate risk in agriculture. The levels of risk perception among different farmers’ wealth groups are also investigated. A total of 100 farmers in the Lawra district of...

  • Article
  • Open Access
178 Citations
26,561 Views
14 Pages

25 August 2018

Background: The number of food pantries on U.S. college campuses has increased in response to students’ food insecurity, but limited information is available to describe the impact of this resource. The objective of this cross-sectional investi...

  • Article
  • Open Access
1,016 Views
30 Pages

15 August 2025

Mobility-as-a-Service (MaaS) represents a transformative shift in transportation, enabling users to plan, book, and pay for diverse mobility services via a unified digital platform. While previous research has explored factors influencing MaaS adopti...

  • Article
  • Open Access
9 Citations
8,299 Views
13 Pages

“Cultural Security Is an On-Going Journey…” Exploring Views from Staff Members on the Quality and Cultural Security of Services for Aboriginal Families in Western Australia

  • Lina Gubhaju,
  • Robyn Williams,
  • Jocelyn Jones,
  • David Hamer,
  • Carrington Shepherd,
  • Dan McAullay,
  • Sandra J. Eades and
  • Bridgette McNamara

Cultural security is a key element of accessible services for Indigenous peoples globally, although few studies have examined this empirically. We explored the scope, reach, quality, and cultural security of health and social services available to Ab...

  • Article
  • Open Access
28 Citations
9,148 Views
15 Pages

The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Intern...

  • Article
  • Open Access
1 Citations
2,539 Views
25 Pages

23 February 2025

Food packaging directly influences consumers’ behavioral tendencies when implementing waste sorting. This study conducted a survey in China, establishing antecedent variables—consumers’ expectations and perceived quality of food pac...

  • Article
  • Open Access
15 Citations
12,169 Views
22 Pages

Mobile sensors have already proven to be helpful in different aspects of people’s everyday lives such as fitness, gaming, navigation, etc. However, illegitimate access to these sensors results in a malicious program running with an exploit path...

  • Article
  • Open Access
45 Citations
7,559 Views
17 Pages

Climate Change and Consumer’s Attitude toward Insect Food

  • Hsiao-Ping Chang,
  • Chun-Chieh Ma and
  • Han-Shen Chen

Given the influence of rising environmental awareness, food systems and security are receiving increasing international attention. Previous studies have discussed the acceptance of insect foods but have been primarily conducted in a European context....

  • Article
  • Open Access
2 Citations
2,774 Views
20 Pages

20 September 2024

The objectives of this study were to assess the perception of a national certification programme for Good Agricultural Practices (GAP), specifically IPR (Integrated Plant Production). Another aim was to indicate the barriers of the implementation and...

  • Article
  • Open Access
603 Views
34 Pages

Living Gluten-Free in Romania: A National Cross-Sectional Study of Dietary Adherence in Clinically Diagnosed and Self-Reported Cases

  • Dana Stanciu,
  • Hristian Staykov,
  • Stela Dragomanova,
  • Lyubka Tancheva,
  • Simeonka Dimitrova,
  • Emanuel Țundrea and
  • Gianina Crișan

23 November 2025

Background/Objectives: A gluten-free diet (GFD) remains the only effective therapy for celiac disease (CD) and non-celiac gluten sensitivity (NCGS). Strict adherence is essential, yet it can impose considerable psychological, social, and financial bu...

  • Article
  • Open Access
11 Citations
7,164 Views
17 Pages

Evaluation of Users’ Knowledge and Concerns of Biometric Passport Systems

  • Taban Habibu,
  • Edith Talina Luhanga and
  • Anael Elikana Sam

29 April 2019

The increase in terrorism and identity fraud has forced governments worldwide to make a combined effort to enhance the security of national borders. Biometric passports are the emergent identity travel document deployed in guaranteeing the safekeepin...

  • Article
  • Open Access
4 Citations
3,387 Views
20 Pages

MVPN: A Defense Architecture against VPN Traffic Hijacking Based on MTD

  • Zhen Gao,
  • Fucai Chen,
  • Yawen Wang,
  • Weizhen He,
  • Xin Shi and
  • Genlin Xie

With the increasing awareness of privacy protection, Virtual Private Networks (VPNs) are widely used to build a more secure communication tunnel. However, a traffic hijacking attack called blind in/on-path has seriously threatened the security of VPN...

  • Article
  • Open Access
1,716 Views
12 Pages

Ethical and Practical Considerations of Physicians and Nurses on Integrating Artificial Intelligence in Clinical Practices in Saudi Arabia: A Cross-Sectional Study

  • Abdulaziz Rashed Alsaedi,
  • Maisam Elfaki Haddad,
  • Roaa Matouq Khinkar,
  • Sumayyah Mohammed Alsharif,
  • Anhar Abdelwahab Elbashir and
  • Ahlam Ali Alghamdi

25 August 2025

Background/Objectives: The emergence of artificial intelligence (AI) has revolutionized the healthcare industry. However, its integration into clinical practices raises ethical and practical concerns. This study aims to explore ethical and practical...

  • Article
  • Open Access
3,206 Views
18 Pages

Diversity Barriers in Animal Care Careers at Zoos and Aquariums

  • Claire Lannoye-Hall and
  • Patricia G. Patrick

We applied social cognitive career theory and systems theory to explore the barriers that historically excluded groups face when pursuing animal care careers at U.S. zoos and aquariums. Using a mixed-methods approach, this research combines survey da...

  • Article
  • Open Access
50 Citations
6,493 Views
12 Pages

This study aimed to investigate the difference in people’s perceived crowding and risk perception during leisure activities using the criteria of spatial proximity during the COVID-19 pandemic. COVID-19 is a viral respiratory tract disease that...

  • Article
  • Open Access
3 Citations
2,783 Views
17 Pages

2 October 2024

While existing studies explore smartphone privacy setting risks for adolescents, they provide limited insight into the role of gender in these dynamics. This study aims to enhance adolescents’ awareness of the security risks associated with sma...

  • Article
  • Open Access
23 Citations
12,321 Views
16 Pages

Climate change (CC) constitutes one of the greatest threats to human health, and requires political awareness for effective and efficient adaptation planning. This study identified the perceptions of climate change and health adaptation (CC&H) am...

  • Article
  • Open Access
3 Citations
9,072 Views
14 Pages

6 March 2024

Moringa oleifera’s high nutritional value and bioactive properties have attracted significant scientific research interest as an additive in broiler feed for sustainable broiler production. The tree’s multifunctional characteristics make...

  • Article
  • Open Access
1,163 Views
14 Pages

The integration of Artificial Intelligence and Robotics (AI/R) in healthcare presents both opportunities and challenges, especially in developing countries. This study assessed the attitudes and perceptions of Vietnamese healthcare undergraduates tow...

  • Article
  • Open Access
24 Citations
9,622 Views
24 Pages

Owing to the emerging challenges on global food security and the decade of controversies over genetically modified food (hereafter GMF), the present study aims to explore the effects of advertisement framing on health and environmental benefits, sour...

  • Article
  • Open Access
12 Citations
3,879 Views
11 Pages

22 November 2022

Responding to the COVID-19 pandemic, the American Rescue Plan (2021) allowed state agencies of the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) the option of temporarily increasing the Cash-Value Benefit (CVB) for fru...

of 2