Arşiv logosu
  • Türkçe
  • English
  • Giriş
    Yeni kullanıcı mısınız? Kayıt için tıklayın. Şifrenizi mi unuttunuz?
Arşiv logosu
  • Koleksiyonlar
  • Sistem İçeriği
  • Analiz
  • Talep/Soru
  • Türkçe
  • English
  • Giriş
    Yeni kullanıcı mısınız? Kayıt için tıklayın. Şifrenizi mi unuttunuz?
  1. Ana Sayfa
  2. Yazara Göre Listele

Yazar "Karayel, Tugce" seçeneğine göre listele

Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
  • Küçük Resim Yok
    Öğe
    Human factors in remote work: examining cyber hygiene practices
    (Emerald Group Publishing Ltd, 2024) Karayel, Tugce; Aktas, Bahadir; Akbiyik, Adem
    PurposeThe purpose of this paper is to investigate the cyber hygiene practices of remote workers.Design/methodology/approachThis paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users' information and computer security behaviors; second, the Recsem Inventory, developed within this paper's context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.FindingsThe findings indicate a significant correlation between the security measures implemented by companies and their employees' cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.Research limitations/implicationsThis paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.Originality/valueThis paper's conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.
  • Küçük Resim Yok
    Öğe
    Understanding smartphone security behavior through the core constructs of protection motivation theory: A comparative study of iOS and android users
    (Elsevier Advanced Technology, 2025) Karayel, Tugce; Saygili, Metin
    This study investigates the factors influencing smartphone users' security behavior intentions through the lens of Protection Motivation Theory (PMT). Utilizing structural equation modeling (PLS-SEM), the research analyzes both a general sample and subgroups based on mobile operating systems (iOS and Android) to explore potential platform-based differences. The findings reveal that threat appraisal components-particularly perceived vulnerability-have a significant impact on users' intentions to engage in mobile security behaviors. Similarly, coping appraisal components, including response efficacy and self-efficacy, are found to be strong predictors of behavioral intention. Interestingly, response cost shows a significant effect only among iOS users, suggesting that perceived burden varies by platform. These results highlight the importance of both cognitive evaluations and contextual factors such as operating systems in shaping users' cybersecurity motivations. The study contributes to the literature by providing nuanced insights into the predictive power of PMT and offering empirical evidence of user segmentation in mobile security behavior.

| Düzce Üniversitesi | Kütüphane | Açık Erişim Politikası | Rehber | OAI-PMH |

Bu site Creative Commons Alıntı-Gayri Ticari-Türetilemez 4.0 Uluslararası Lisansı ile korunmaktadır.


Düzce Üniversitesi, Kütüphane ve Dokümantasyon Daire Başkanlığı, Düzce, TÜRKİYE
İçerikte herhangi bir hata görürseniz lütfen bize bildirin

DSpace 7.6.1, Powered by İdeal DSpace

DSpace yazılımı telif hakkı © 2002-2026 LYRASIS

  • Çerez Ayarları
  • Gizlilik Politikası
  • Son Kullanıcı Sözleşmesi
  • Geri Bildirim