These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
173 related articles for article (PubMed ID: 34803469)
61. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Saeed S; Suayyid SA; Al-Ghamdi MS; Al-Muhaisen H; Almuhaideb AM Sensors (Basel); 2023 Aug; 23(16):. PubMed ID: 37631808 [TBL] [Abstract][Full Text] [Related]
62. The Role of User Behaviour in Improving Cyber Security Management. Moustafa AA; Bello A; Maurushat A Front Psychol; 2021; 12():561011. PubMed ID: 34220596 [TBL] [Abstract][Full Text] [Related]
63. Maritime cybersecurity: are onboard systems ready? Kanwal K; Shi W; Kontovas C; Yang Z; Chang CH Marit Policy Manag; 2024; 51(3):484-502. PubMed ID: 38832094 [TBL] [Abstract][Full Text] [Related]
64. It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling. Kleitman S; Law MKH; Kay J PLoS One; 2018; 13(10):e0205089. PubMed ID: 30365492 [TBL] [Abstract][Full Text] [Related]
65. Information Security Awareness and Behaviors of Health Care Professionals at Public Health Care Facilities. Alhuwail D; Al-Jafar E; Abdulsalam Y; AlDuaij S Appl Clin Inform; 2021 Aug; 12(4):924-932. PubMed ID: 34587638 [TBL] [Abstract][Full Text] [Related]
66. Phishing suspiciousness in older and younger adults: The role of executive functioning. Gavett BE; Zhao R; John SE; Bussell CA; Roberts JR; Yue C PLoS One; 2017; 12(2):e0171620. PubMed ID: 28158316 [TBL] [Abstract][Full Text] [Related]
67. Cybersecurity and critical care staff: A mixed methods study. Hore K; Hoi Tan M; Kehoe A; Beegan A; Mason S; Al Mane N; Hughes D; Kelly C; Wells J; Magner C Int J Med Inform; 2024 May; 185():105412. PubMed ID: 38492407 [TBL] [Abstract][Full Text] [Related]
68. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach. He M; Devine L; Zhuang J Risk Anal; 2018 Feb; 38(2):215-225. PubMed ID: 28799659 [TBL] [Abstract][Full Text] [Related]
69. An overview of cybersecurity in Zimbabwe's financial services sector. Maphosa V F1000Res; 2023; 12():1251. PubMed ID: 38559360 [TBL] [Abstract][Full Text] [Related]
70. Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. Savaş S; Karataş S Int Cybersecur Law Rev; 2022; 3(1):7-34. PubMed ID: 37521508 [TBL] [Abstract][Full Text] [Related]
71. Is This Phishing? Older Age Is Associated With Greater Difficulty Discriminating Between Safe and Malicious Emails. Grilli MD; McVeigh KS; Hakim ZM; Wank AA; Getz SJ; Levin BE; Ebner NC; Wilson RC J Gerontol B Psychol Sci Soc Sci; 2021 Oct; 76(9):1711-1715. PubMed ID: 33378418 [TBL] [Abstract][Full Text] [Related]
73. Susceptibility to phishing on social network sites: A personality information processing model. Frauenstein ED; Flowerday S Comput Secur; 2020 Jul; 94():101862. PubMed ID: 32501314 [TBL] [Abstract][Full Text] [Related]
74. Setting Priorities in Behavioral Interventions: An Application to Reducing Phishing Risk. Canfield CI; Fischhoff B Risk Anal; 2018 Apr; 38(4):826-838. PubMed ID: 29023908 [TBL] [Abstract][Full Text] [Related]
75. How personal characteristics impact phishing susceptibility: The mediating role of mail processing. Ge Y; Lu L; Cui X; Chen Z; Qu W Appl Ergon; 2021 Nov; 97():103526. PubMed ID: 34246073 [TBL] [Abstract][Full Text] [Related]