{"id":"https://openalex.org/W4391232766","doi":"https://doi.org/10.1093/cybsec/tyae001","title":"Cybersecurity when working from home during COVID-19: considering the human factors","display_name":"Cybersecurity when working from home during COVID-19: considering the human factors","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4391232766","doi":"https://doi.org/10.1093/cybsec/tyae001"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyae001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae001/56410930/tyae001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae001/56410930/tyae001.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054441117","display_name":"Monica T. Whitty","orcid":"https://orcid.org/0000-0001-8143-289X"},"institutions":[{"id":"https://openalex.org/I4210110573","display_name":"Victoria University","ror":"https://ror.org/01rrz9s51","country_code":"UG","type":"education","lineage":["https://openalex.org/I4210110573"]},{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU","UG"],"is_corresponding":true,"raw_author_name":"Monica T Whitty","raw_affiliation_strings":["Monash University, Software Systems and Cybersecurity , Wellington Road, Melbourne, Victoria, 3800 ,","Monash University, Software Systems and Cybersecurity, Wellington Road, Melbourne, Victoria, 3800, Australia"],"raw_orcid":"https://orcid.org/0000-0001-8143-289X","affiliations":[{"raw_affiliation_string":"Monash University, Software Systems and Cybersecurity , Wellington Road, Melbourne, Victoria, 3800 ,","institution_ids":["https://openalex.org/I4210110573"]},{"raw_affiliation_string":"Monash University, Software Systems and Cybersecurity, Wellington Road, Melbourne, Victoria, 3800, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089327837","display_name":"Nour Moustafa","orcid":"https://orcid.org/0000-0001-6127-9349"},"institutions":[{"id":"https://openalex.org/I188329596","display_name":"University of Canberra","ror":"https://ror.org/04s1nv328","country_code":"AU","type":"education","lineage":["https://openalex.org/I188329596"]},{"id":"https://openalex.org/I4394709116","display_name":"UNSW Canberra","ror":"https://ror.org/0125wpx05","country_code":null,"type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I4394709116"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Nour Moustafa","raw_affiliation_strings":["UNSW Canberra , Northcott Drive, Campbell, ACT 2612 ,","UNSW Canberra, Northcott Drive, Campbell, ACT 2612, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"UNSW Canberra , Northcott Drive, Campbell, ACT 2612 ,","institution_ids":["https://openalex.org/I188329596"]},{"raw_affiliation_string":"UNSW Canberra, Northcott Drive, Campbell, ACT 2612, Australia","institution_ids":["https://openalex.org/I4394709116"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058516861","display_name":"Marthie Grobler","orcid":"https://orcid.org/0000-0001-6933-0145"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1317689889","display_name":"Idaho Department of Fish and Game","ror":"https://ror.org/03fcx9267","country_code":"US","type":"government","lineage":["https://openalex.org/I1317689889"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU","US"],"is_corresponding":false,"raw_author_name":"Marthie Grobler","raw_affiliation_strings":["CSIRO\u2019s Data61 , Village St & Fishplate Ln, Docklands, VIC 3008 ,","CSIRO's Data61, Village St & Fishplate Ln, Docklands, VIC 3008, Australia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CSIRO\u2019s Data61 , Village St & Fishplate Ln, Docklands, VIC 3008 ,","institution_ids":["https://openalex.org/I1317689889"]},{"raw_affiliation_string":"CSIRO's Data61, Village St & Fishplate Ln, Docklands, VIC 3008, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5054441117"],"corresponding_institution_ids":["https://openalex.org/I4210110573","https://openalex.org/I56590836"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":9.0754,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.98296139,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10168","display_name":"COVID-19 and Mental Health","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10168","display_name":"COVID-19 and Mental Health","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9678999781608582,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13585","display_name":"Technostress in Professional Settings","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/coronavirus-disease-2019","display_name":"Coronavirus disease 2019 (COVID-19)","score":0.8098244667053223},{"id":"https://openalex.org/keywords/2019-20-coronavirus-outbreak","display_name":"2019-20 coronavirus outbreak","score":0.5761470198631287},{"id":"https://openalex.org/keywords/severe-acute-respiratory-syndrome-coronavirus-2","display_name":"Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2)","score":0.5629647970199585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4072721600532532},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3933752477169037},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.37219297885894775},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.32293498516082764},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3105841279029846},{"id":"https://openalex.org/keywords/virology","display_name":"Virology","score":0.2734834551811218},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.1961415708065033}],"concepts":[{"id":"https://openalex.org/C3008058167","wikidata":"https://www.wikidata.org/wiki/Q84263196","display_name":"Coronavirus disease 2019 (COVID-19)","level":4,"score":0.8098244667053223},{"id":"https://openalex.org/C3006700255","wikidata":"https://www.wikidata.org/wiki/Q81068910","display_name":"2019-20 coronavirus outbreak","level":3,"score":0.5761470198631287},{"id":"https://openalex.org/C3007834351","wikidata":"https://www.wikidata.org/wiki/Q82069695","display_name":"Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2)","level":5,"score":0.5629647970199585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4072721600532532},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3933752477169037},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.37219297885894775},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.32293498516082764},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3105841279029846},{"id":"https://openalex.org/C159047783","wikidata":"https://www.wikidata.org/wiki/Q7215","display_name":"Virology","level":1,"score":0.2734834551811218},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.1961415708065033},{"id":"https://openalex.org/C2779134260","wikidata":"https://www.wikidata.org/wiki/Q12136","display_name":"Disease","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C524204448","wikidata":"https://www.wikidata.org/wiki/Q788926","display_name":"Infectious disease (medical specialty)","level":3,"score":0.0},{"id":"https://openalex.org/C116675565","wikidata":"https://www.wikidata.org/wiki/Q3241045","display_name":"Outbreak","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyae001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae001/56410930/tyae001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:monash.edu:openaire/f861db9b-2980-449f-a856-a4c380ff1b9b","is_oa":true,"landing_page_url":"https://research.monash.edu/en/publications/f861db9b-2980-449f-a856-a4c380ff1b9b","pdf_url":"https://researchmgt.monash.edu/ws/files/589097224/569475481_oa.pdf","source":{"id":"https://openalex.org/S4306402625","display_name":"Monash University Research Portal (Monash University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I56590836","host_organization_name":"Monash University","host_organization_lineage":["https://openalex.org/I56590836"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Whitty, M, Moustafa, N & Globler, M 2024, 'Cybersecurity when working from home during COVID-19 : considering the human factors', Journal of Cybersecurity, vol. 10, no. 1, tyae001, pp. 1-11. https://doi.org/10.1093/cybsec/tyae001","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyae001","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyae001","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/10/1/tyae001/56410930/tyae001.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4391232766.pdf"},"referenced_works_count":45,"referenced_works":["https://openalex.org/W196595950","https://openalex.org/W1480074367","https://openalex.org/W1537665415","https://openalex.org/W1979290264","https://openalex.org/W2008112018","https://openalex.org/W2021647714","https://openalex.org/W2037202491","https://openalex.org/W2096748949","https://openalex.org/W2146144825","https://openalex.org/W2154540357","https://openalex.org/W2286539585","https://openalex.org/W2411687311","https://openalex.org/W2887975821","https://openalex.org/W2896921551","https://openalex.org/W2897297778","https://openalex.org/W2901922477","https://openalex.org/W2905592043","https://openalex.org/W2922335955","https://openalex.org/W2936357463","https://openalex.org/W2946747224","https://openalex.org/W2965098094","https://openalex.org/W2967341710","https://openalex.org/W2971453734","https://openalex.org/W3006556904","https://openalex.org/W3027643953","https://openalex.org/W3033923639","https://openalex.org/W3036035276","https://openalex.org/W3072587856","https://openalex.org/W3081388862","https://openalex.org/W3090473955","https://openalex.org/W3120918731","https://openalex.org/W3134664163","https://openalex.org/W3153675992","https://openalex.org/W3154908766","https://openalex.org/W4391078981","https://openalex.org/W6608019517","https://openalex.org/W6628501660","https://openalex.org/W6681341951","https://openalex.org/W6754443126","https://openalex.org/W6757024985","https://openalex.org/W6773904236","https://openalex.org/W6781923469","https://openalex.org/W6782379611","https://openalex.org/W6794425983","https://openalex.org/W6860055038"],"related_works":["https://openalex.org/W4206669628","https://openalex.org/W3036314732","https://openalex.org/W4205317059","https://openalex.org/W3009669391","https://openalex.org/W4382894326","https://openalex.org/W3198183218","https://openalex.org/W3081785542","https://openalex.org/W3171943759","https://openalex.org/W3176864053","https://openalex.org/W3084498529"],"abstract_inverted_index":{"Abstract":[0],"This":[1,130],"research":[2],"examined":[3],"the":[4,29,154,194],"lives":[5,34],"of":[6,31,90,140],"Australian":[7],"employees":[8,168,201],"who":[9],"moved":[10],"to":[11,21,25,37,49,80,128,164,173,202],"work":[12,203],"from":[13,204],"home":[14,171],"during":[15],"COVID-19.":[16],"Taking":[17],"a":[18,118,141],"unique":[19],"approach":[20],"cybersecurity,":[22],"we":[23],"sought":[24],"gain":[26],"insights":[27],"into":[28],"intermingling":[30],"individuals\u2019":[32],"personal":[33,134],"and":[35,40,66,78,115,176,178,184],"technology":[36,92],"inform":[38],"policies":[39],"educational":[41],"programmes.":[42],"The":[43],"study":[44],"employed":[45],"interpretative":[46],"phenomenological":[47],"analysis":[48],"understand":[50],"27":[51],"participants\u2019":[52],"lived":[53],"experiences":[54],"under":[55],"lockdown.":[56],"We":[57,110,144],"found":[58],"that":[59,112,123,133,146,152],"psychological":[60,156],"(e.g.":[61,68,93,104],"stress,":[62],"anxiety,":[63],"confidence,":[64],"motivation)":[65],"sociological":[67],"sharing":[69],"physical":[70],"spaces,":[71],"digital":[72,181],"divide)":[73],"factors":[74,135],"impacted":[75],"employees\u2019":[76,155,180],"likelihood":[77],"ability":[79],"engage":[81],"in":[82,107],"effective":[83],"cybersecurity":[84],"practices.":[85],"So":[86],"did":[87],"new":[88],"ways":[89,163],"using":[91],"teaching":[94],"via":[95],"Zoom),":[96],"which":[97,121],"elucidated":[98],"unexpected":[99],"but":[100],"significant":[101],"security":[102],"concerns":[103],"naked":[105],"children":[106],"virtual":[108],"classrooms).":[109],"suggest":[111],"cyber":[113],"educators":[114],"policymakers":[116],"take":[117],"Vygotskian":[119],"approach,":[120],"considers":[122],"social":[124],"interaction":[125],"is":[126],"central":[127],"learning.":[129],"assumption":[131],"means":[132],"must":[136],"be":[137],"considered":[138],"instead":[139],"\u2018one-size-fits-all":[142],"approach\u2019.":[143],"argue":[145],"organizations":[147],"should":[148],"think":[149],"about":[150],"approaches":[151],"consider":[153],"state":[157],"before":[158],"training":[159],"(and":[160],"perhaps":[161],"find":[162],"reduce":[165],"anxiety),":[166],"helping":[167],"redesign":[169],"their":[170],"workspaces":[172],"ensure":[174],"privacy":[175],"concentration,":[177],"updating":[179],"devices.":[182],"Practitioners":[183],"scholars":[185],"can":[186],"also":[187],"apply":[188],"these":[189],"results":[190],"post-COVID-19,":[191],"especially":[192],"if":[193],"\u2018new":[195],"working":[196],"normal\u2019":[197],"provides":[198],"options":[199],"for":[200],"home.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-24T08:23:43.765630","created_date":"2025-10-10T00:00:00"}
