Araştırma Makalesi
BibTex RIS Kaynak Göster

Dijital Çağda Çalışma Güvenliği: Uzaktan Çalışmada Siber Hijyen Yaklaşımı

Yıl 2025, Cilt: 13 Sayı: 1, 138 - 157, 27.03.2025
https://doi.org/10.22139/jobs.1623655

Öz

Bu çalışmada, dijital çağda uzaktan çalışma ortamlarında siber hijyenin önemi ve etkinliği incelenmiştir. Sonuçlar, birçok çalışanın siber güvenlik konusunda yeterli bilgiye sahip olmadığını ve işletmelerin siber hijyen politikalarını uygulamada eksiklikler yaşadığını ortaya koymuştur. Uzaktan çalışmanın artmasıyla, siber tehditlere karşı daha güçlü önlemler alınması gerekliliği vurgulanmıştır. Siber Hijyen Eğitimi: Çalışanlara yönelik düzenli siber güvenlik eğitimleri verilmelidir. Güvenlik Politikaları: Uzaktan çalışma için özel siber güvenlik politikaları oluşturulmalı ve uygulanmalıdır. Güvenlik Yazılımları: Antivirüs ve diğer güvenlik yazılımları kullanılmalı ve güncel tutulmalıdır. İki Faktörlü Kimlik Doğrulama: Hesap güvenliğini artırmak için 2FA zorunlu hale getirilmelidir. Veri Şifreleme: Hassas veriler için uçtan uca şifreleme yöntemleri uygulanmalıdır. Veri Yedekleme: Düzenli veri yedekleme politikaları izlenmelidir. Denetimler: Düzenli siber güvenlik denetimleri yapılmalı ve zayıf noktalar giderilmelidir. Farkındalık Kampanyaları: Çalışanların siber tehditler hakkında bilinçlenmesi için kampanyalar düzenlenmelidir. Bu öneriler, uzaktan çalışma ortamlarında siber güvenliğin artırılmasına ve siber tehditlerin minimize edilmesine katkı sağlayacak stratejik adımlardır.

Kaynakça

  • Argyridou, E., Nifakos, S., Laoudias, C., Panda, S., Panaousis, E., Chandramouli, K., Navarro-Llobet, D., Mora Zamorano, J., Papachristou, P., & Bonacina, S. (2023). Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study. Journal of Medical Internet Research, 25, 1–17. https://doi.org/10.2196/41294
  • Aslan, T., Aktaş, B., & Akbıyık, A. (2020). Kullanıcıların bilgisayar güvenliği davranışını inceleme: Siber hijyen. 7. Uluslararası Yönetim Bilişim Sistemleri Konferansı “Sağlık Bilişimi ve Analitiği”, İzmir, Türkiye.
  • Awan, M. S., & Dahabiyeh, L. (2018). Corporate attractiveness index: A measure for assessing the potential of a cyber attack. 9th International Conference on Information and Communication Systems, Irbid, Jordan.
  • Baraković, S., & Husić, K. B. (2023a). Cyber hygiene knowledge, awareness, and behavioral practices of university students. Information Security Journal: A Global Perspective, 32(5), 347–370. https://doi.org/10.1080/19393555.2022.2088428
  • Baraković, S., & Husić, J. B. (2023b). Impact of COVID-19 pandemic circumstances on cyber hygiene of university students. International Journal of Human–Computer Interaction, 1–20. https://doi.org/10.1080/10447318.2023.2247577
  • Blythe, J. M., Sombatruang, N., & Johnson, S. D. (2019). What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? Journal of Cybersecurity, 1–10. https://doi.org/10.1093/cybsec/tyz005
  • Bochman, A. (2018). The end of cybersecurity. Harvard Business Review, 1–27.
  • Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45. https://doi.org/10.1016/j.jisa.2018.08.002
  • Çelik, S., & Çeliktaş, B. (2018). Güncel siber güvenlik tehditleri: Fidye yazılımlar. Cyberpolitik Journal, 3(5), 105-132.
  • Chaudhry, J. A., & Rittenhouse, R. G. (2015). Phishing: Classification and countermeasures. 7th International Conference on Multimedia, Computer Graphics and Broadcasting, Jeju, South Korea.
  • Fenech, J., Richards, D., & Formosa, P. (2024). Ethical principles shaping values-based cybersecurity decision-making. Computers & Security, 140, 1–17. https://doi.org/10.1016/j.cose.2024.103795
  • Fikry, A., Hamzah, M. I., Hussein, Z., & Saputra, D. H. (2023). Cyber hygiene practices from the lens of professional youth in Malaysia. 11th ASIAN Conference on Environment-Behaviour Studies, Kuala Terengganu, Malaysia.
  • Golzar, J., & Tajik, H. (2022). Convenience sampling. International Journal of Education and Language Studies, 1(2), 72–77. https://doi.org/10.22034/ijels.2022.162981
  • Güler, A., & Arkın, A. K. (2019). Siber hijyenin sağlanmasında iç denetimin rolü. Denetişim, 9(19), 17–40.
  • Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.
  • Kalhoro, S., Rehman, M., Ponnusamy, V. A., & Shaikh, F. B. (2021). Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review. IEEE Access, 9, 99339–99363.
  • Kamerer, J. L., & McDermott, D. S. (2023). Cyber hygiene concepts for nursing education. Nurse Education Today, 130.
  • Karanfiloğlu, M. (2022). Digital literacy in increasing data security: An evaluation from the communicator’s perspective. In N. Çokluk & N. Kara (Eds.), Privacy in the digital age: Digital communication and personal data (pp. 43–60). Literatürk Academia.
  • Karayel, T., Aktaş, B., & Akbıyık, A. (2024). Human factors in remote work: Examining cyber hygiene practices. Information & Computer Security, 33(1), 1–21. https://doi.org/10.1108/ICS-11-2023-0215
  • Karimnia, R., Maennel, K., & Shahin, M. (2022). Culturally-sensitive cybersecurity awareness program design for Iranian high-school students. Proceedings of the 8th International Conference on Information Systems Security and Privacy.
  • Khan, S., & Madnick, S. (2022). Cybersafety: A system-theoretic approach to identify cyber-vulnerabilities & mitigation requirements in industrial control systems. IEEE Transactions on Dependable and Secure Computing, 19(5), 1–17. https://doi.org/10.1109/TDSC.2021.3093214
  • Kilhoffer, Z., Zhou, Z., Wang, F., Tamton, F., Huang, Y., Kim, P., The, T., & Wang, Y. (2023). “How technical do you get? I’m an English teacher”: Teaching and learning cybersecurity and AI ethics in high school. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP46215.2023.10179333
  • Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0. Applied Sciences, 13. https://doi.org/10.3390/app13063410
  • Kont, K. R. (2023). Information security awareness of librarians in the Baltic countries: A comparative analysis. Baltic Journal of Modern Computing, 11(3), 450–474. https://doi.org/10.22364/bjmc.2023.11.3.07
  • MacCallum, R. C., & Widaman, K. F. (1999). Sample size in factor analysis. Psychological Methods, 4(1), 84–99. https://doi.org/10.1037/1082-989X.4.1.84
  • Mohammadi, F., Panou, A., Ntantogian, C., Karapistoli, E., Panaousis, E., & Xenakis, C. (2019). CUREX: Secure and private health data exchange. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (pp. 263–268). https://doi.org/10.1145/3358695.3361753
  • Mwangala, J., Bhunu Shava, F., & Chitauro, S. (2023). Human intelligence an enabler for cyber resilience: A case for Namibian public institutions. IST-Africa 2023 Conference, Tshwane, South Africa.
  • Ncubukezi, T., Mwansa, L., & Rocaries, F. (2020). A review of the current cyber hygiene in small and medium-sized businesses. Proceedings of the 15th International Conference for Internet Technology and Secured Transactions (ICITST), London, United Kingdom.
  • Neigel, A. R., Claypoole, V. L., Waldfogle, G. E., Acharya, S., & Hancock, G. M. (2020). Holistic cyber hygiene education: Accounting for the human factors. Computers & Security, 92.
  • Ngo, F. T., Agarwal, A., & Holman, K. (2024). Cyber hygiene and cyber victimization among limited English proficiency (LEP) Internet users: A mixed-method study. Victims & Offenders, 1–23. https://doi.org/10.1080/15564886.2024.2329765
  • Olivares-Rojas, J. C., Reyes-Archundia, E., Gutiérrez-Gnecchi, J. A., Molina-Moreno, I., Méndez-Patiño, A., & Cerda-Jacobo, J. (2023). Cyber hygiene in smart metering systems. Computación y Sistemas, 27(2), 459-475.
  • Olivares-Rojas, J. C., Reyes-Archundia, E., Gutiérrez-Gnecchi, J. A., Molina-Moreno, I., Cerda-Jacobo, J., & Méndez-Patiño, A. (2021). A methodology for cyber hygiene in smart grids. DYNA Ingeniería e Industria, 97(1), 92-97.
  • Oravec, J. A. (2017). Emerging “cyber hygiene” practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security. IEEE International Professional Communication Conference (ProComm), Madison, WI, USA.
  • Petrykina, Y., Schwartz-Chassidim, H., & Toch, E. (2021). Nudging users towards online safety using gamified environments. Computers & Security, 108.
  • Pool, J., Akhlaghpour, S., & Fatehi, F. (2020). Towards a contextual theory of mobile health data protection (MHDP): A realist perspective. International Journal of Medical Informatics, 141, 104196. https://doi.org/10.1016/j.ijmedinf.2020.104196
  • Saleem, F. (2019). A novel multiple access quantum key distribution network for secure communication [Doctoral dissertation, University of Bradford Repository]
  • Salem, M. A., & Sobaih, A. E. E. (2023). A quadruple “E” approach for effective cyber-hygiene behaviour and attitude toward online learning among higher-education students in Saudi Arabia amid COVID-19 pandemic. Electronics, 12(10), Article 2268. https://doi.org/10.3390/electronics12102268
  • Shah, P., & Agarwal, A. (2023). Cyber Suraksha: A card game for smartphone security awareness. Information & Computer Security, 31(5), 456–472.
  • Skarga-Bandurova, I., Kotsiuba, I., & Velasco, E. R. (2021). Cyber hygiene maturity assessment framework for smart grid scenarios. Frontiers in Computer Science, 3, Article 614337. https://doi.org/10.3389/fcomp.2021.614337
  • Stifel, M., Giroud, K., & Walsh, R. (2022). Cyber hygiene can support cyber peace. In S. J. Shackelford, F. Douzet, & C. Ankersen (Eds.), Cyber peace: Charting a path toward a sustainable, stable, and secure cyberspace (pp. 223–229). Cambridge University Press.
  • Sweeney, J., & Tran, V. (2022). Improving protection against cybersecurity attacks of emergency dispatch centers. In Proceedings of the 17th International Conference on Information Warfare and Security (pp. 134–142). Albany, New York, USA.
  • Szczepaniuk, E. K., & Szczepaniuk, H. (2022). Analysis of cybersecurity competencies: Recommendations for telecommunications policy. Telecommunications Policy, 26, 102145.
  • Taber, K. S. (2018). The use of Cronbach’s alpha when developing and reporting research instruments in science education. Research in Science Education, 48, 1273–1296. https://doi.org/10.1007/s11165-016-9602-2
  • Teke, A., & Lale, A. (2021). Sosyal medyada etik, bilgi manipülasyonu ve siber güvenlik. Akademik İncelemeler Dergisi, 16(2), 45–60.
  • Tripware. (2018). Tripwire state of cyber hygiene report. https://static.fortra.com/tripwire/pdfs/guides/tw-dimensional-research-state-of-cyber-hygiene-gd.pdf (Erişim tarihi: 19 Ocak 2025).
  • Ugwu, C., Ani, C., Ezema, M., Asogwa, C., Ome, U., Obayi, A., Ebem, D., Olebra, C., & Ukwandu, E. (2022). Towards determining the effect of age and educational level on cyber-hygiene. In Proceedings of the 4th International Conference on Disruptive Technologies for Sustainable Development. Abuja, Nigeria. https://doi.org/10.1109/NIGERCON54645.2022.9803154
  • Vishwanath, A., Neo, L. S., Goh, P., Lee, S., Khader, M., Ong, G., & Chin, J. (2020). Cyber hygiene: The concept, its measure, and its initial tests. Decision Support Systems, 128, 113167.
  • Webb, T., & Dayal, S. (2017). Building the wall: Addressing cybersecurity risks in medical devices in the U.S.A. and Australia. Computer Law & Security Review, 33(4), 419–432.
  • Whitty, M. T., Moustafa, N., & Grobler, M. (2024). Cybersecurity when working from home during COVID-19: Considering the human factors. Journal of Cybersecurity, 10(1), Article tyae001. https://doi.org/10.1093/cybsec/tyae001
  • Wong, L. W., Lee, V. H., Tan, G. W. H., & Ooi, K. B. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102552.
  • Yılmaz, S. Z. (2023). Siber uzayda özel hayatın gizliliği hakkını yeniden tartışmak [Doctoral dissertation, Selçuk Üniversitesi].
  • Zhang, Y., & Malacaria, P. (2023). Keep spending: Beyond optimal cyber-security investment. In Proceedings of the 36th Computer Security Foundations Symposium (pp. 1–14). Dubrovnik, Croatia. https://doi.org/10.1109/CSF57540.2023.00024

Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work

Yıl 2025, Cilt: 13 Sayı: 1, 138 - 157, 27.03.2025
https://doi.org/10.22139/jobs.1623655

Öz

In this study, the importance and effectiveness of cyber hygiene in remote working environments during the digital age were examined. The results revealed that many employees lack sufficient knowledge about cybersecurity, and companies face difficulties in implementing cyber hygiene policies. With the increase in remote working, the necessity of taking stronger measures against cyber threats has been emphasized.
Cyber Hygiene Training: Regular cybersecurity training should be provided for employees. Security Policies: Special cybersecurity policies for remote work should be developed and implemented. Security Software: Antivirus and other security software should be used and kept up to date. Two-Factor Authentication (2FA): 2FA should be made mandatory to enhance account security. Data Encryption: End-to-end encryption methods should be applied for sensitive data. Data Backup: Regular data backup policies should be followed. Audits: Regular cybersecurity audits should be conducted, and vulnerabilities should be addressed. Awareness Campaigns: Campaigns should be organized to raise employees' awareness of cyber threats. These recommendations provide strategic steps to enhance cybersecurity in remote working environments and minimize cyber threats.

Kaynakça

  • Argyridou, E., Nifakos, S., Laoudias, C., Panda, S., Panaousis, E., Chandramouli, K., Navarro-Llobet, D., Mora Zamorano, J., Papachristou, P., & Bonacina, S. (2023). Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: Concept study. Journal of Medical Internet Research, 25, 1–17. https://doi.org/10.2196/41294
  • Aslan, T., Aktaş, B., & Akbıyık, A. (2020). Kullanıcıların bilgisayar güvenliği davranışını inceleme: Siber hijyen. 7. Uluslararası Yönetim Bilişim Sistemleri Konferansı “Sağlık Bilişimi ve Analitiği”, İzmir, Türkiye.
  • Awan, M. S., & Dahabiyeh, L. (2018). Corporate attractiveness index: A measure for assessing the potential of a cyber attack. 9th International Conference on Information and Communication Systems, Irbid, Jordan.
  • Baraković, S., & Husić, K. B. (2023a). Cyber hygiene knowledge, awareness, and behavioral practices of university students. Information Security Journal: A Global Perspective, 32(5), 347–370. https://doi.org/10.1080/19393555.2022.2088428
  • Baraković, S., & Husić, J. B. (2023b). Impact of COVID-19 pandemic circumstances on cyber hygiene of university students. International Journal of Human–Computer Interaction, 1–20. https://doi.org/10.1080/10447318.2023.2247577
  • Blythe, J. M., Sombatruang, N., & Johnson, S. D. (2019). What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? Journal of Cybersecurity, 1–10. https://doi.org/10.1093/cybsec/tyz005
  • Bochman, A. (2018). The end of cybersecurity. Harvard Business Review, 1–27.
  • Cain, A. A., Edwards, M. E., & Still, J. D. (2018). An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 42, 36–45. https://doi.org/10.1016/j.jisa.2018.08.002
  • Çelik, S., & Çeliktaş, B. (2018). Güncel siber güvenlik tehditleri: Fidye yazılımlar. Cyberpolitik Journal, 3(5), 105-132.
  • Chaudhry, J. A., & Rittenhouse, R. G. (2015). Phishing: Classification and countermeasures. 7th International Conference on Multimedia, Computer Graphics and Broadcasting, Jeju, South Korea.
  • Fenech, J., Richards, D., & Formosa, P. (2024). Ethical principles shaping values-based cybersecurity decision-making. Computers & Security, 140, 1–17. https://doi.org/10.1016/j.cose.2024.103795
  • Fikry, A., Hamzah, M. I., Hussein, Z., & Saputra, D. H. (2023). Cyber hygiene practices from the lens of professional youth in Malaysia. 11th ASIAN Conference on Environment-Behaviour Studies, Kuala Terengganu, Malaysia.
  • Golzar, J., & Tajik, H. (2022). Convenience sampling. International Journal of Education and Language Studies, 1(2), 72–77. https://doi.org/10.22034/ijels.2022.162981
  • Güler, A., & Arkın, A. K. (2019). Siber hijyenin sağlanmasında iç denetimin rolü. Denetişim, 9(19), 17–40.
  • Kaiser, H. F. (1974). An index of factorial simplicity. Psychometrika, 39(1), 31-36.
  • Kalhoro, S., Rehman, M., Ponnusamy, V. A., & Shaikh, F. B. (2021). Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review. IEEE Access, 9, 99339–99363.
  • Kamerer, J. L., & McDermott, D. S. (2023). Cyber hygiene concepts for nursing education. Nurse Education Today, 130.
  • Karanfiloğlu, M. (2022). Digital literacy in increasing data security: An evaluation from the communicator’s perspective. In N. Çokluk & N. Kara (Eds.), Privacy in the digital age: Digital communication and personal data (pp. 43–60). Literatürk Academia.
  • Karayel, T., Aktaş, B., & Akbıyık, A. (2024). Human factors in remote work: Examining cyber hygiene practices. Information & Computer Security, 33(1), 1–21. https://doi.org/10.1108/ICS-11-2023-0215
  • Karimnia, R., Maennel, K., & Shahin, M. (2022). Culturally-sensitive cybersecurity awareness program design for Iranian high-school students. Proceedings of the 8th International Conference on Information Systems Security and Privacy.
  • Khan, S., & Madnick, S. (2022). Cybersafety: A system-theoretic approach to identify cyber-vulnerabilities & mitigation requirements in industrial control systems. IEEE Transactions on Dependable and Secure Computing, 19(5), 1–17. https://doi.org/10.1109/TDSC.2021.3093214
  • Kilhoffer, Z., Zhou, Z., Wang, F., Tamton, F., Huang, Y., Kim, P., The, T., & Wang, Y. (2023). “How technical do you get? I’m an English teacher”: Teaching and learning cybersecurity and AI ethics in high school. IEEE Symposium on Security and Privacy. https://doi.org/10.1109/SP46215.2023.10179333
  • Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023). The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0. Applied Sciences, 13. https://doi.org/10.3390/app13063410
  • Kont, K. R. (2023). Information security awareness of librarians in the Baltic countries: A comparative analysis. Baltic Journal of Modern Computing, 11(3), 450–474. https://doi.org/10.22364/bjmc.2023.11.3.07
  • MacCallum, R. C., & Widaman, K. F. (1999). Sample size in factor analysis. Psychological Methods, 4(1), 84–99. https://doi.org/10.1037/1082-989X.4.1.84
  • Mohammadi, F., Panou, A., Ntantogian, C., Karapistoli, E., Panaousis, E., & Xenakis, C. (2019). CUREX: Secure and private health data exchange. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence (pp. 263–268). https://doi.org/10.1145/3358695.3361753
  • Mwangala, J., Bhunu Shava, F., & Chitauro, S. (2023). Human intelligence an enabler for cyber resilience: A case for Namibian public institutions. IST-Africa 2023 Conference, Tshwane, South Africa.
  • Ncubukezi, T., Mwansa, L., & Rocaries, F. (2020). A review of the current cyber hygiene in small and medium-sized businesses. Proceedings of the 15th International Conference for Internet Technology and Secured Transactions (ICITST), London, United Kingdom.
  • Neigel, A. R., Claypoole, V. L., Waldfogle, G. E., Acharya, S., & Hancock, G. M. (2020). Holistic cyber hygiene education: Accounting for the human factors. Computers & Security, 92.
  • Ngo, F. T., Agarwal, A., & Holman, K. (2024). Cyber hygiene and cyber victimization among limited English proficiency (LEP) Internet users: A mixed-method study. Victims & Offenders, 1–23. https://doi.org/10.1080/15564886.2024.2329765
  • Olivares-Rojas, J. C., Reyes-Archundia, E., Gutiérrez-Gnecchi, J. A., Molina-Moreno, I., Méndez-Patiño, A., & Cerda-Jacobo, J. (2023). Cyber hygiene in smart metering systems. Computación y Sistemas, 27(2), 459-475.
  • Olivares-Rojas, J. C., Reyes-Archundia, E., Gutiérrez-Gnecchi, J. A., Molina-Moreno, I., Cerda-Jacobo, J., & Méndez-Patiño, A. (2021). A methodology for cyber hygiene in smart grids. DYNA Ingeniería e Industria, 97(1), 92-97.
  • Oravec, J. A. (2017). Emerging “cyber hygiene” practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security. IEEE International Professional Communication Conference (ProComm), Madison, WI, USA.
  • Petrykina, Y., Schwartz-Chassidim, H., & Toch, E. (2021). Nudging users towards online safety using gamified environments. Computers & Security, 108.
  • Pool, J., Akhlaghpour, S., & Fatehi, F. (2020). Towards a contextual theory of mobile health data protection (MHDP): A realist perspective. International Journal of Medical Informatics, 141, 104196. https://doi.org/10.1016/j.ijmedinf.2020.104196
  • Saleem, F. (2019). A novel multiple access quantum key distribution network for secure communication [Doctoral dissertation, University of Bradford Repository]
  • Salem, M. A., & Sobaih, A. E. E. (2023). A quadruple “E” approach for effective cyber-hygiene behaviour and attitude toward online learning among higher-education students in Saudi Arabia amid COVID-19 pandemic. Electronics, 12(10), Article 2268. https://doi.org/10.3390/electronics12102268
  • Shah, P., & Agarwal, A. (2023). Cyber Suraksha: A card game for smartphone security awareness. Information & Computer Security, 31(5), 456–472.
  • Skarga-Bandurova, I., Kotsiuba, I., & Velasco, E. R. (2021). Cyber hygiene maturity assessment framework for smart grid scenarios. Frontiers in Computer Science, 3, Article 614337. https://doi.org/10.3389/fcomp.2021.614337
  • Stifel, M., Giroud, K., & Walsh, R. (2022). Cyber hygiene can support cyber peace. In S. J. Shackelford, F. Douzet, & C. Ankersen (Eds.), Cyber peace: Charting a path toward a sustainable, stable, and secure cyberspace (pp. 223–229). Cambridge University Press.
  • Sweeney, J., & Tran, V. (2022). Improving protection against cybersecurity attacks of emergency dispatch centers. In Proceedings of the 17th International Conference on Information Warfare and Security (pp. 134–142). Albany, New York, USA.
  • Szczepaniuk, E. K., & Szczepaniuk, H. (2022). Analysis of cybersecurity competencies: Recommendations for telecommunications policy. Telecommunications Policy, 26, 102145.
  • Taber, K. S. (2018). The use of Cronbach’s alpha when developing and reporting research instruments in science education. Research in Science Education, 48, 1273–1296. https://doi.org/10.1007/s11165-016-9602-2
  • Teke, A., & Lale, A. (2021). Sosyal medyada etik, bilgi manipülasyonu ve siber güvenlik. Akademik İncelemeler Dergisi, 16(2), 45–60.
  • Tripware. (2018). Tripwire state of cyber hygiene report. https://static.fortra.com/tripwire/pdfs/guides/tw-dimensional-research-state-of-cyber-hygiene-gd.pdf (Erişim tarihi: 19 Ocak 2025).
  • Ugwu, C., Ani, C., Ezema, M., Asogwa, C., Ome, U., Obayi, A., Ebem, D., Olebra, C., & Ukwandu, E. (2022). Towards determining the effect of age and educational level on cyber-hygiene. In Proceedings of the 4th International Conference on Disruptive Technologies for Sustainable Development. Abuja, Nigeria. https://doi.org/10.1109/NIGERCON54645.2022.9803154
  • Vishwanath, A., Neo, L. S., Goh, P., Lee, S., Khader, M., Ong, G., & Chin, J. (2020). Cyber hygiene: The concept, its measure, and its initial tests. Decision Support Systems, 128, 113167.
  • Webb, T., & Dayal, S. (2017). Building the wall: Addressing cybersecurity risks in medical devices in the U.S.A. and Australia. Computer Law & Security Review, 33(4), 419–432.
  • Whitty, M. T., Moustafa, N., & Grobler, M. (2024). Cybersecurity when working from home during COVID-19: Considering the human factors. Journal of Cybersecurity, 10(1), Article tyae001. https://doi.org/10.1093/cybsec/tyae001
  • Wong, L. W., Lee, V. H., Tan, G. W. H., & Ooi, K. B. (2022). The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities. International Journal of Information Management, 66, 102552.
  • Yılmaz, S. Z. (2023). Siber uzayda özel hayatın gizliliği hakkını yeniden tartışmak [Doctoral dissertation, Selçuk Üniversitesi].
  • Zhang, Y., & Malacaria, P. (2023). Keep spending: Beyond optimal cyber-security investment. In Proceedings of the 36th Computer Security Foundations Symposium (pp. 1–14). Dubrovnik, Croatia. https://doi.org/10.1109/CSF57540.2023.00024
Toplam 52 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular İşletme , İş Sistemleri (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Faruk Dursun 0000-0003-1571-1107

Erken Görünüm Tarihi 24 Mart 2025
Yayımlanma Tarihi 27 Mart 2025
Gönderilme Tarihi 20 Ocak 2025
Kabul Tarihi 13 Mart 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 13 Sayı: 1

Kaynak Göster

APA Dursun, F. (2025). Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. İşletme Bilimi Dergisi, 13(1), 138-157. https://doi.org/10.22139/jobs.1623655
AMA Dursun F. Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. About the Journal. Mart 2025;13(1):138-157. doi:10.22139/jobs.1623655
Chicago Dursun, Faruk. “Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work”. İşletme Bilimi Dergisi 13, sy. 1 (Mart 2025): 138-57. https://doi.org/10.22139/jobs.1623655.
EndNote Dursun F (01 Mart 2025) Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. İşletme Bilimi Dergisi 13 1 138–157.
IEEE F. Dursun, “Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work”, About the Journal, c. 13, sy. 1, ss. 138–157, 2025, doi: 10.22139/jobs.1623655.
ISNAD Dursun, Faruk. “Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work”. İşletme Bilimi Dergisi 13/1 (Mart 2025), 138-157. https://doi.org/10.22139/jobs.1623655.
JAMA Dursun F. Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. About the Journal. 2025;13:138–157.
MLA Dursun, Faruk. “Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work”. İşletme Bilimi Dergisi, c. 13, sy. 1, 2025, ss. 138-57, doi:10.22139/jobs.1623655.
Vancouver Dursun F. Digital Age Workplace Security: Cyber Hygiene Approach in Remote Work. About the Journal. 2025;13(1):138-57.