Yazar "Karayel, Tugce" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Human factors in remote work: examining cyber hygiene practices(Emerald Group Publishing Ltd, 2024) Karayel, Tugce; Aktas, Bahadir; Akbiyik, AdemPurposeThe purpose of this paper is to investigate the cyber hygiene practices of remote workers.Design/methodology/approachThis paper used two instruments: first, the Cyber Hygiene Inventory scale, which measures users' information and computer security behaviors; second, the Recsem Inventory, developed within this paper's context, to evaluate the cybersecurity measures adopted by organizations for remote workers. It was conducted on remote workers to examine their information security practices. The instrument was administered to a sample of 442 employees reached via the LinkedIn platform. Analyses were performed with SPSS v26, Python programming language and Seaborn library.FindingsThe findings indicate a significant correlation between the security measures implemented by companies and their employees' cyber hygiene practices. A sector comparison revealed a significant difference in cyber hygiene levels between public and private sector workers.Research limitations/implicationsThis paper aims to provide policymakers with suggestions for enhancing the cyber hygiene of remote workers to facilitate compliance with corporate security protocols.Originality/valueThis paper's conclusions highlight the importance of companies increasing their cybersecurity investments as remote work becomes more prevalent. This should consider not only corporate-level factors but also employees' information and computer security behaviors.Öğe Understanding smartphone security behavior through the core constructs of protection motivation theory: A comparative study of iOS and android users(Elsevier Advanced Technology, 2025) Karayel, Tugce; Saygili, MetinThis study investigates the factors influencing smartphone users' security behavior intentions through the lens of Protection Motivation Theory (PMT). Utilizing structural equation modeling (PLS-SEM), the research analyzes both a general sample and subgroups based on mobile operating systems (iOS and Android) to explore potential platform-based differences. The findings reveal that threat appraisal components-particularly perceived vulnerability-have a significant impact on users' intentions to engage in mobile security behaviors. Similarly, coping appraisal components, including response efficacy and self-efficacy, are found to be strong predictors of behavioral intention. Interestingly, response cost shows a significant effect only among iOS users, suggesting that perceived burden varies by platform. These results highlight the importance of both cognitive evaluations and contextual factors such as operating systems in shaping users' cybersecurity motivations. The study contributes to the literature by providing nuanced insights into the predictive power of PMT and offering empirical evidence of user segmentation in mobile security behavior.












