{"id":"https://openalex.org/W3041786843","doi":"https://doi.org/10.1108/ics-05-2020-0073","title":"A novel approach for improving information security management and awareness for home environments","display_name":"A novel approach for improving information security management and awareness for home environments","publication_year":2020,"publication_date":"2020-07-30","ids":{"openalex":"https://openalex.org/W3041786843","doi":"https://doi.org/10.1108/ics-05-2020-0073","mag":"3041786843"},"language":"en","primary_location":{"id":"doi:10.1108/ics-05-2020-0073","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-05-2020-0073","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10026.1/15855","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108724354","display_name":"Fayez Alotaibi","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]},{"id":"https://openalex.org/I206935292","display_name":"Shaqra University","ror":"https://ror.org/05hawb687","country_code":"SA","type":"education","lineage":["https://openalex.org/I206935292"]}],"countries":["GB","SA"],"is_corresponding":true,"raw_author_name":"Fayez Ghazai Alotaibi","raw_affiliation_strings":["Center for Security, Communications and Network Research, University of Plymouth, Plymouth, UK and Department of Computer Science, College of Science and Humanities in Dawadmi, Shaqra University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center for Security, Communications and Network Research, University of Plymouth, Plymouth, UK and Department of Computer Science, College of Science and Humanities in Dawadmi, Shaqra University, Saudi Arabia","institution_ids":["https://openalex.org/I206935292","https://openalex.org/I897542642"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029670131","display_name":"Nathan Clarke","orcid":"https://orcid.org/0000-0002-3595-3800"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Nathan Clarke","raw_affiliation_strings":["University of Plymouth, Plymouth, UK and Security Research Institute, Edith Cowan University, Joondalup, Australia"],"affiliations":[{"raw_affiliation_string":"University of Plymouth, Plymouth, UK and Security Research Institute, Edith Cowan University, Joondalup, Australia","institution_ids":["https://openalex.org/I12079687","https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033160778","display_name":"Steven Furnell","orcid":"https://orcid.org/0000-0003-0984-7542"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]},{"id":"https://openalex.org/I12079687","display_name":"Edith Cowan University","ror":"https://ror.org/05jhnwe22","country_code":"AU","type":"education","lineage":["https://openalex.org/I12079687"]}],"countries":["AU","GB"],"is_corresponding":false,"raw_author_name":"Steven M. Furnell","raw_affiliation_strings":["University of Plymouth, Plymouth, UK and Security Research Institute, Edith Cowan University, Joondalup, Australia"],"affiliations":[{"raw_affiliation_string":"University of Plymouth, Plymouth, UK and Security Research Institute, Edith Cowan University, Joondalup, Australia","institution_ids":["https://openalex.org/I12079687","https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108724354"],"corresponding_institution_ids":["https://openalex.org/I206935292","https://openalex.org/I897542642"],"apc_list":null,"apc_paid":null,"fwci":1.0607,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.76695194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"29","issue":"1","first_page":"25","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bespoke","display_name":"Bespoke","score":0.8606569766998291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6354396343231201},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4288233518600464},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.15639963746070862}],"concepts":[{"id":"https://openalex.org/C44210515","wikidata":"https://www.wikidata.org/wiki/Q16968978","display_name":"Bespoke","level":2,"score":0.8606569766998291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6354396343231201},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4288233518600464},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.15639963746070862},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/ics-05-2020-0073","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-05-2020-0073","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/15855","is_oa":true,"landing_page_url":"http://hdl.handle.net/10026.1/15855","pdf_url":"http://hdl.handle.net/10026.1/15855","source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal-article"},{"id":"pmh:oai:ro.ecu.edu.au:ecuworkspost2013-10528","is_oa":true,"landing_page_url":"https://ro.ecu.edu.au/ecuworkspost2013/9521","pdf_url":null,"source":{"id":"https://openalex.org/S2765015692","display_name":"Australasian Journal of Paramedicine","issn_l":"2202-7270","issn":["2202-7270"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Research outputs 2014 to 2021","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/15855","is_oa":true,"landing_page_url":"http://hdl.handle.net/10026.1/15855","pdf_url":"http://hdl.handle.net/10026.1/15855","source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W3041786843.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W31805335","https://openalex.org/W63126046","https://openalex.org/W103880451","https://openalex.org/W1277468559","https://openalex.org/W1584270256","https://openalex.org/W1844628735","https://openalex.org/W1975066611","https://openalex.org/W1985747251","https://openalex.org/W1996190548","https://openalex.org/W2008713384","https://openalex.org/W2015076643","https://openalex.org/W2022259081","https://openalex.org/W2044935933","https://openalex.org/W2110505891","https://openalex.org/W2126360800","https://openalex.org/W2134497979","https://openalex.org/W2293109295","https://openalex.org/W2613315625","https://openalex.org/W2775195841","https://openalex.org/W2889380573","https://openalex.org/W2971282343"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2181465263","https://openalex.org/W2232750048","https://openalex.org/W2806540758","https://openalex.org/W4244794230","https://openalex.org/W2966906842","https://openalex.org/W4385256045","https://openalex.org/W2997784300","https://openalex.org/W4385730189"],"abstract_inverted_index":{"Purpose":[0],"The":[1,67,132,267,275,311],"human":[2],"factor":[3],"is":[4,135,222,270,283,295,317],"a":[5,39,78,120,149,198,225,284,318,330,338,356,406],"major":[6],"consideration":[7],"in":[8,69,95,148,224,263,300,329,365],"securing":[9],"systems.":[10],"A":[11,181,228],"wide":[12],"and":[13,22,45,47,57,62,71,91,106,126,139,158,191,213,243,251,273,298,304,344,358,378,386,391,412,417,422,426],"increasing":[14],"range":[15,40],"of":[16,41,137,230,248,314,341,347,409],"different":[17,42,141,145,231,246,388],"technologies,":[18,88],"devices,":[19],"platforms,":[20],"applications":[21],"services":[23,427],"are":[24,36,48,155,394],"being":[25,50],"used":[26],"every":[27],"day":[28],"by":[29,261,383],"home":[30,34,129,194,307,371,381,403,420],"users.":[31,130,195,308,372],"In":[32,196,253,287],"parallel,":[33],"users":[35,382,404],"also":[37,73],"experiencing":[38],"online":[43],"threats":[44,61],"attacks":[46],"increasingly":[49,103],"targeted":[51],"as":[52,428],"they":[53,289],"lack":[54],"the":[55,75,97,162,166,176,205,210,214,239,255,264,279,292,315,326,335,342,345,348,375,395,419],"knowledge":[56],"awareness":[58,127,172,192,305,379],"about":[59],"potential":[60],"how":[63,82,238],"to":[64,80,83,112,118,160,169,203,208,236,397],"protect":[65,416],"themselves.":[66],"increase":[68],"technologies":[70],"platforms":[72],"increases":[74],"burden":[76],"upon":[77],"user":[79],"understand":[81],"apply":[84],"security":[85,98,124,142,189,302,368,376,389,410],"across":[86,99],"differing":[87],"operating":[89],"systems":[90],"applications.":[92],"This":[93,109,353],"results":[94],"managing":[96,387],"their":[100],"technology":[101],"portfolio":[102],"more":[104],"troublesome":[105],"time":[107],"consuming.":[108],"paper":[110],"aims":[111],"propose":[113,119],"an":[114],"approach":[115,207,257,294,328],"that":[116,278,291],"attempts":[117],"system":[121,134,240,316],"for":[122,128,144,186,193,306,370,380],"improving":[123,187,301,366],"management":[125,190,303,369,377,411],"Design/methodology/approach":[131],"proposed":[133,185,206,256,293,312,327,349],"capable":[136],"creating":[138],"assigning":[140],"policies":[143,154,168],"digital":[146],"devices":[147,250],"user-friendly":[150],"fashion.":[151],"These":[152],"assigned":[153,167],"monitored,":[156],"checked":[157],"managed":[159],"review":[161],"user\u2019s":[163,177],"compliance":[164],"with":[165,245,337],"provide":[170,334],"bespoke":[171],"content":[173],"based":[174],"on":[175],"current":[178],"needs.":[179],"Findings":[180],"novel":[182],"framework":[183,357],"was":[184,201],"information":[188,367,399],"addition,":[197,254,288],"mock-up":[199,319,360],"design":[200,313,320,361],"developed":[202],"simulate":[204],"visualise":[209],"main":[211],"concept":[212],"functions":[215],"which":[216,362],"might":[217],"be":[218],"performed":[219],"when":[220,402],"it":[221],"deployed":[223],"real":[226,285,322,331],"environment.":[227],"number":[229],"scenarios":[232],"have":[233,405],"been":[234,259],"simulated":[235],"show":[237],"can":[241,333,363],"manage":[242],"deal":[244],"types":[247],"users,":[249],"threats.":[252],"has":[258],"evaluated":[260],"experts":[262,276],"research":[265,281],"domain.":[266],"overall":[268],"feedback":[269],"positive,":[271],"constructive":[272],"encouraging.":[274],"agreed":[277,290],"identified":[280],"problem":[282],"problem.":[286],"usable,":[296],"feasible":[297],"effective":[299],"Research":[309],"limitations/implications":[310],"without":[321],"data.":[323],"Therefore,":[324,401],"implementing":[325],"environment":[332],"researcher":[336],"better":[339],"understanding":[340],"effectiveness":[343],"functionality":[346],"approach.":[350],"Practical":[351],"implications":[352],"study":[354],"offers":[355],"usable":[359],"help":[364],"Originality/value":[373],"Improving":[374],"monitoring,":[384],"checking":[385],"controls":[390],"configurations":[392],"effectively":[393],"key":[396],"strengthen":[398],"security.":[400],"good":[407],"level":[408],"awareness,":[413],"this":[414],"could":[415],"secure":[418],"network":[421],"subsequently":[423],"business":[424],"infrastructure":[425],"well.":[429]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
