{"id":"https://openalex.org/W2081739005","doi":"https://doi.org/10.1145/2390317.2390318","title":"The human element in cyber security","display_name":"The human element in cyber security","publication_year":2012,"publication_date":"2012-10-12","ids":{"openalex":"https://openalex.org/W2081739005","doi":"https://doi.org/10.1145/2390317.2390318","mag":"2081739005"},"language":"en","primary_location":{"id":"doi:10.1145/2390317.2390318","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2390317.2390318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2012 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013865825","display_name":"Rebecca LeFebvre","orcid":null},"institutions":[{"id":"https://openalex.org/I172980758","display_name":"Kennesaw State University","ror":"https://ror.org/00jeqjx33","country_code":"US","type":"education","lineage":["https://openalex.org/I172980758"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rebecca LeFebvre","raw_affiliation_strings":["Kennesaw State University, Kennesaw, GA","Kennesaw State University, Kennesaw, Ga"],"affiliations":[{"raw_affiliation_string":"Kennesaw State University, Kennesaw, GA","institution_ids":["https://openalex.org/I172980758"]},{"raw_affiliation_string":"Kennesaw State University, Kennesaw, Ga","institution_ids":["https://openalex.org/I172980758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5013865825"],"corresponding_institution_ids":["https://openalex.org/I172980758"],"apc_list":null,"apc_paid":null,"fwci":2.8422,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.92271694,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10485","display_name":"Bullying, Victimization, and Aggression","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6783542037010193},{"id":"https://openalex.org/keywords/feeling","display_name":"Feeling","score":0.5885725617408752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5589472651481628},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.5535493493080139},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.48590293526649475},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4806169867515564},{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.44590651988983154},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.43416255712509155},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4244585931301117},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.4224620461463928},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.41708970069885254},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.34930574893951416},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3472251296043396},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.30302315950393677},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.28909096121788025},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.15420591831207275}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6783542037010193},{"id":"https://openalex.org/C122980154","wikidata":"https://www.wikidata.org/wiki/Q205555","display_name":"Feeling","level":2,"score":0.5885725617408752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5589472651481628},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.5535493493080139},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.48590293526649475},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4806169867515564},{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.44590651988983154},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.43416255712509155},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4244585931301117},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.4224620461463928},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.41708970069885254},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.34930574893951416},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3472251296043396},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30302315950393677},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.28909096121788025},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.15420591831207275},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2390317.2390318","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2390317.2390318","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2012 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7400000095367432,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W28696327","https://openalex.org/W1516532723","https://openalex.org/W1969135869","https://openalex.org/W1970799258","https://openalex.org/W1998315570","https://openalex.org/W2063236501","https://openalex.org/W2146323809","https://openalex.org/W2152957505","https://openalex.org/W2153852789","https://openalex.org/W2294662036","https://openalex.org/W6682777995"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2544387082","https://openalex.org/W2968709340","https://openalex.org/W2099222119","https://openalex.org/W2888935944"],"abstract_inverted_index":{"The":[0,75,119,138],"internet":[1],"was":[2,159],"originally":[3],"designed":[4],"as":[5,153,155],"an":[6],"open":[7],"system":[8],"for":[9,166],"trustworthy":[10],"users,":[11],"yet":[12],"with":[13,109],"its":[14],"rapid":[15],"growth":[16],"rate,":[17],"it":[18],"has":[19],"become":[20],"vulnerable":[21],"to":[22,66,131,147,149],"cyber":[23,30,41,73],"crime.":[24,74],"Much":[25],"research":[26],"exists":[27,39],"on":[28,40,51,79],"promoting":[29],"security":[31,42],"awareness":[32,43],"among":[33],"employees":[34],"of":[35,72,86,105,113,117,124,129,164],"businesses,":[36],"but":[37],"less":[38],"in":[44,142],"the":[45,52,70,87],"general":[46,53],"population.":[47],"This":[48],"paper":[49],"focuses":[50],"student":[54],"population":[55],"at":[56],"Kennesaw":[57],"State":[58],"University":[59],"(KSU),":[60],"examining":[61],"how":[62],"they":[63],"are":[64],"motivated":[65],"protect":[67],"themselves":[68],"from":[69],"threat":[71],"study's":[76],"framework":[77],"draws":[78],"Roger's":[80],"Protection":[81],"Motivation":[82],"Theory,":[83],"making":[84],"use":[85],"five":[88],"motivational":[89],"factors:":[90],"risk":[91],"severity,":[92],"vulnerability,":[93],"self-efficacy,":[94],"response":[95,98,139],"efficacy,":[96],"and":[97,111,144],"cost.":[99],"Research":[100],"methods":[101],"used":[102],"include":[103],"observation":[104],"on-campus":[106],"classes,":[107],"interviews":[108],"instructors,":[110],"surveys":[112],"a":[114,160],"random":[115],"sampling":[116],"students.":[118],"results":[120],"showed":[121],"that":[122],"feelings":[123],"vulnerability":[125],"were":[126],"significant":[127,161],"indicators":[128],"motivation":[130,165],"take":[132],"precautions":[133],"when":[134],"using":[135],"social":[136,150],"networks.":[137],"cost,":[140],"measured":[141],"time":[143],"money":[145],"required":[146],"respond":[148],"networking":[151],"threats":[152],"well":[154],"computer":[156],"virus":[157],"threats,":[158],"negative":[162],"indicator":[163],"action.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
