• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link

Related Topics

  • Concept Of Security
  • Concept Of Security
  • Economic Security
  • Economic Security
  • Security Concern
  • Security Concern

Articles published on Security culture

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
1414 Search results
Sort by
Recency
  • New
  • Research Article
  • 10.1038/s41598-025-26917-x
Information security behavior of healthcare professionals in the Sultanate of Oman based on the PMT model
  • Dec 2, 2025
  • Scientific Reports
  • A Al Toobi + 1 more

Protecting sensitive information is critical in healthcare. Healthcare professionals (HCPs) must adhere to information security rules to safeguard patient information and maintain the integrity of healthcare systems. This study explores the impact of the Protection Motivation Theory (PMT) on the information security behavior of HCPs in the Sultanate of Oman’s MOH hospitals. This study uses a quantitative research design to assess information security behaviors of HCPs using PMT factors, including perceived severity, perceived vulnerability, maladaptive rewards, response efficacy, self-efficacy, and response costs. A standardized questionnaire was used to collect data from a sample of HCPs in MOH hospitals in the Sultanate. The study found that perceived severity and response efficacy significantly influence HCPs’ motivation to engage in secure practices. Maladaptive rewards did not affect security behavior, likely due to a robust organizational culture and effective training programs. Response costs positively influenced security behaviors, suggesting that effective communication, balancing response costs, and leveraging organizational culture can foster a more substantial commitment to information security. The study highlights the importance of threat and coping appraisal in HCPs’ security protocols, emphasizing the need for tailored interventions and ongoing education to foster a security culture.

  • New
  • Research Article
  • 10.55041/ijsrem54558
The State of Cybersecurity Awareness: An Interdisciplinary Analysis of Technical, and Policy Dimensions.
  • Nov 26, 2025
  • International Journal of Scientific Research in Engineering and Management
  • Priti Mule

Abstract The world is witnessing a significant rise in cybersecurity incidents driven by increasingly sophisticated threats, rapid growth in digital connectivity, and persistent human vulnerabilities. Although advanced security technologies are being developed and many nations and international organizations continue to establish cybersecurity frameworks, a considerable gap remains between cybersecurity awareness and the actual secure behaviors practiced by users. This paper examines the state of cybersecurity awareness through three interconnected dimensions: human, technical, and policy. The study identifies key human factors - such as susceptibility to social engineering, poor cyber hygiene practices, limited security knowledge, and weak organizational security culture - as major contributors to cybersecurity risks. It further analyzes the technical aspects of cybersecurity, highlighting common attack vectors, shortcomings in digital infrastructure, and the growing need for resilient and adaptive security architectures capable of addressing evolving threat landscapes. At the policy level, the research evaluates national cybersecurity strategies, compliance frameworks, regulatory guidelines, and awareness initiatives that aim to strengthen digital resilience. Keywords: Cybersecurity Awareness, Human Factors, Cyber Hygiene, Social Engineering, Technical Vulnerabilities, Cyber Threats, Security Infrastructure, National Cybersecurity Strategies, Cyber Policies, Cyber Resilience, Data Breaches, Risk Management, Security Training, Cybersecurity Culture, Digital Safety.

  • New
  • Research Article
  • 10.1080/00295450.2025.2541416
System Dynamics Modeling for Nuclear Security Culture Assessment
  • Nov 21, 2025
  • Nuclear Technology
  • Keonhee Lee + 2 more

A robust organizational culture plays a vital role in upholding nuclear safety and security by shaping individual decision making. Recognizing this significance, international initiatives have focused on fostering nuclear safety and security culture within nuclear facilities. To assess these cultural aspects, various methodologies, including surveys, interviews, document reviews, and observations, have been applied. Nevertheless, the inherent complexity and evolving nature of organizational culture pose challenges in identifying improvement areas and examining policy impacts. This study presents a system dynamics (SD) model to assess nuclear security culture in nuclear facilities that accounts for these cultural dynamics. The proposed SD model is comprised of a causal loop diagram that illustrates feedback loops, such as a policy-work environment, workload-stress, and learning mechanisms, as well as a stock flow diagram that quantifies the dynamic interplay of these elements through stock and flow processes. To empirically validate the hypothesized relationships within the model, survey data from 846 nuclear power plant workers and 10 physical protection experts in the Republic of Korea, collected in 2015, were analyzed. The statistical analysis demonstrated the need for two distinct SD models, one for security personnel and another for nonsecurity personnel, based on the proportion of time allocated to security duties relative to total working hours. To assess the validity of the key model inputs, a comparative analysis using survey data from 2014 and 2015 was conducted. A sensitivity analysis that examined the effects of policy interventions to improve nuclear security culture was conducted using a baseline scenario with no carryover of security knowledge across years. The findings indicated that for nonsecurity personnel, the most effective strategy was to increase security knowledge by shortening the training cycle and enhancing its quality. For security personnel, strategies that focused on enhancing the policy level and increasing the frequency of regulatory actions were the most impactful. The developed SD model provides a quantitative tool to capture dynamic system behaviors, thereby facilitating the analysis of cultural interrelationships and informing more effective policy implementation.

  • New
  • Research Article
  • 10.1017/s0940739125100155
Cultural heritage in security discourse: Mapping the securitization process
  • Nov 17, 2025
  • International Journal of Cultural Property
  • Dilek Elvan Çokişler

Abstract This article maps how cultural heritage has been securitized in international discourse by analyzing seven key United Nations Educational, Scientific, and Cultural Organization (UNESCO) and UN Security Council (UNSC) documents (2003–2017). Drawing on the Copenhagen School’s framework and its distinction between identification and mobilization, the study reveals a two-stage process. Initially, heritage destruction was framed as a human rights violation, later escalating into a global security threat linked to terrorism and conflict financing. Through a sectoral and scalar typology of referent objects, the analysis highlights divergent framings by UNESCO (societal, normative) and the UNSC (military, strategic). Despite strong discursive alignment—culminating in UNSC Resolution 2347—the mobilization of extraordinary measures remained limited. The article concludes that heritage securitization is discursively robust but operationally incomplete, shaped by institutional capacities, leadership shifts, and evolving geopolitical contexts. These findings contribute to the broader literature on security politics, norm diffusion, and the symbolic power of heritage in global governance.

  • New
  • Research Article
  • 10.24144/2307-3322.2025.91.3.16
Models of policing: a comparative analysis
  • Nov 17, 2025
  • Uzhhorod National University Herald. Series: Law
  • A.V Kubaienko

The article is devoted to a systematic analysis of modern models of policing in the context of their evolution, comparative assessment, and the prospects for adaptation to Ukrainian realities. The author proceeds from the premise that modernization processes in public administration and global security transformations necessitate a conceptual rethinking of the role of the police as an institution of public authority. The study emphasizes the multidimensional nature of the police function, which integrates legal, social, psychological, and managerial aspects, as well as its dependence on the level of public trust and compliance with democratic standards. The article reveals the essence of the traditional incident-reactive model that has historically dominated law enforcement systems and provides a detailed characterization of modern proactive approaches, including Community-Oriented Policing, Problem-Oriented Policing, Intelligence-Led Policing, Predictive Policing, the CompStat strategic management model, the Broken Windows Policing approach, and the data-driven DDACTS model. Their conceptual foundations, managerial architecture, and socio-practical value for maintaining public order are highlighted. Special attention is paid to the challenges of implementing innovative models in contemporary conditions, among which are the fragmentation of institutional reforms, resource constraints, underdeveloped analytical infrastructure, and the need to ensure transparency and accountability.The article argues for the relevance of developing a hybrid integrative model – the Adaptive Hybrid Policing Model (AHPM) – which combines strategic forecasting, tactical flexibility, social partnership, normative-ethical safeguards, and an information-cybernetic component. The latter provides the technological backbone – integrated data-governance and analytics platforms, AI/ML-driven predictive tools, cybersecurity and operational-continuity regimes, and standardized interagency data-sharing protocols – thereby ensuring interoperability, accountability in data processing, and resilience to hybrid threats. This approach harmonizes reactive and proactive elements of policing, enhancing its effectiveness, legitimacy, and capacity for integration into the European security space. The proposed model may serve as a methodological basis for improving the activities of the National Police of Ukraine, strengthening public trust, and fostering a modern security culture.

  • New
  • Research Article
  • 10.30525/2256-0742/2025-11-5-1-15
PLAYING IT SAFE: LEGAL AND ECONOMIC DIMENSIONS OF SPORT EVENT SECURITY
  • Nov 13, 2025
  • Baltic Journal of Economic Studies
  • Marina Kamenecka-Usova + 2 more

The issue of safety at sports mega-events, with a particular focus on football matches, has emerged as a pivotal concern for policymakers, event organisers and international governing bodies. Whilst such events are held to symbolise unity and cultural exchange, they also present substantial legal, economic and organisational challenges. The present study investigates the multifaceted issue of stadium safety by examining its legal frameworks, economic ramifications, and evolving technological solutions, employing football as the primary case study. The present study adopts a multidisciplinary methodology. A comprehensive review of the extant literature, encompassing academic studies, regulatory guidelines and institutional reports, established the theoretical foundation. A review of historical case studies was conducted to extract lessons from past failures in crowd management and emergency response. The case studies included the Hillsborough, Heysel, and Luzhniki disasters. Comparative and economic analyses were employed to evaluate safety investments in various regions and contexts, focusing on FIFA World Cup evaluations and national strategies, including those of the Latvian Football Federation. Additionally, the contributions of international legal instruments, including the Saint-Denis Convention, the Balance S4 Initiative and the Green Guide, to safety, security and services in stadium environments were evaluated. Finally, technological projects such as eVACUATE were analysed to determine their innovative contributions to predictive crowd modelling and emergency coordination. The primary objective of this research endeavour is to investigate the potential for aligning legal regulations, economic considerations, and technological innovation to engender safer and more inclusive sports environments. A fundamental concept in the analysis is the development of a "security culture", encompassing awareness, collaboration, adaptability, technological integration, and cultural sensitivity. The study emphasises the necessity of embedding this culture into stadium management, thereby highlighting the importance of implementing both preventive measures and rapid responsiveness to evolving risks, including the emergence of threats such as cyberattacks. The findings show that, although safety investments require significant financial commitments, the long-term costs of neglect, measured in terms of human lives lost, reputational damage and legal liabilities, far exceed the costs of prevention. Lessons from past tragedies emphasise the importance of consistently enforcing safety frameworks and integrating best practices into national policies. Furthermore, technological advances in crowd monitoring, evacuation planning and data-driven decision-making offer the opportunity to enhance existing protocols. In conclusion, the study argues that achieving sustainable safety at major sporting events requires international co-operation, standardised legal frameworks and balanced economic strategies. Future policy should focus on reducing disparities between countries with different resources, promoting a global culture of safety and investing in innovation driven by research. Such measures will ensure that sporting events remain secure, inclusive and celebratory occasions.

  • New
  • Research Article
  • 10.3390/culture1010004
On the Cairo Declaration and the Establishment and Reshaping of the Postwar Cultural Order in Asia
  • Nov 11, 2025
  • Culture
  • Amal Zhuo Li + 1 more

World War II profoundly reshaped Asia’s political and cultural landscape. With the decline of European colonial empires and the defeat of Japanese militarism, national liberation movements surged across Asia. As nations fought for political sovereignty, they also faced the task of reestablishing their cultural identity. This paper argues that the Cairo Declaration, as a pivotal international legal document during WWII, not only provided the legal foundation for establishing the postwar political order in Asia but also established regional cultural norms centered on anti-fascism, territorial sovereignty, and respect for cultural diversity. However, this order suffered severe shocks under the Cold War framework, with frequent regional conflicts and bloc confrontation eroding national sovereignty and cultural independence. Against this backdrop, this paper proposes a return to the normative core of the Cairo Declaration to construct an Asian cultural security framework comprising three key elements: respecting sovereign equality and cultural self-determination to rebuild the cornerstone of Asian cultural order; synergistically constructing a post-fascist settlement alongside an Asian human rights system; and transitioning from adversarial narratives to shared values, thereby laying a profound foundation for civilizational dialog that supports regional sustainable development.

  • Research Article
  • 10.37547/ijp/volume05issue11-49
Methodology For Developing Students' Information Exchange And Security Culture In A Digital Learning Environment: A Case Study In Computer Engineering
  • Nov 1, 2025
  • International Journal of Pedagogics
  • Solijanov Muhammad-Ali

The rapid shift toward digital learning environments in higher education, particularly within technology-focused disciplines such as computer engineering, has redefined how students interact, collaborate, and exchange information. While this transition brings enhanced flexibility and resource accessibility, it also introduces new vulnerabilities related to information security and ethical use of digital platforms. This paper presents a structured methodology for cultivating a culture of secure information exchange among computer engineering students in digital learning environments. The study is driven by the recognition that digital literacy alone is insufficient students must also develop awareness, attitudes, and behaviors that prioritize information safety, responsible sharing, and ethical collaboration. The proposed methodology is grounded in a multidisciplinary approach that includes digital pedagogy, cybersecurity education, behavioral science, and peer learning strategies. It combines formal instruction on secure communication tools and protocols with experiential learning activities such as simulations, gamified scenarios, and collaborative assignments that require secure practices. The methodology was implemented in a controlled academic setting with third-year computer engineering students. It involved a four-phase cycle: (1) baseline assessment of students’ security awareness and sharing habits; (2) delivery of instructional content and interactive workshops on secure communication and information ethics; (3) integration of security-conscious practices in collaborative coursework and projects; and (4) post-intervention evaluation through surveys, peer reviews, and repository audits. Findings from the intervention indicate significant improvements in students’ understanding of cybersecurity principles, increased use of secure sharing tools (e.g., Git with multi-factor authentication), and a notable shift in attitudes towards digital responsibility. The majority of students reported heightened sensitivity to access permissions, password hygiene, and potential data exposure risks during online collaboration. Peer interactions also reflected improved norms around responsible information handling. This study concludes that embedding security culture into the educational process - not as an add-on but as a core component of academic and technical activities - can foster sustainable behavioral change. The article contributes to the growing body of literature on digital learning and student cybersecurity by offering a practical, scalable model that educators in engineering and related fields can adapt to their institutional contexts. Future research is recommended to explore the long-term effects of such methodologies and their applicability across other disciplines in digital education.

  • Research Article
  • 10.1016/j.ecolind.2025.114330
The feedback mechanism between water culture and water security in the Yellow River Basin
  • Nov 1, 2025
  • Ecological Indicators
  • Tong Nie + 9 more

The feedback mechanism between water culture and water security in the Yellow River Basin

  • Research Article
  • 10.30574/ijsra.2025.17.1.2734
Human factor vulnerabilities in healthcare cybersecurity: Mitigating insider threats in medical facilities
  • Oct 30, 2025
  • International Journal of Science and Research Archive
  • Oghenemena Erukayenure + 5 more

Healthcare organizations are experiencing a swift increase in cyberattacks targeting valuable patient data and essential systems. Healthcare often spends less on cybersecurity infrastructure than other industries, which makes human weaknesses a major risk factor. Staff and insiders are often to blame for major breaches. Objective: This study seeks to examine the primary human-factor vulnerabilities in healthcare cybersecurity and to suggest strategies for reducing insider threats in medical facilities. Methods: We executed a systematic literature review of peer-reviewed studies, industry reports, and breach data (2015–2024) in accordance with PRISMA guidelines. Qualitative thematic coding was employed to identify persistent human-risk themes and assess current mitigation frameworks. The review shows that most healthcare breaches are caused by mistakes made by people or people who work for the company. Some of the most important weaknesses are being open to social engineering (especially phishing) and being careless because of not enough training, being tired, or a bad security culture. Malicious insiders (data theft, sabotage) and compromised credentials (phishing victims) make the risk even higher. Good ways to reduce risk include technological controls (like access management and monitoring), organizational policies (like role-based privileges and zero-trust), and human-centered measures (like regular training and stress management). Our proposed multi-layered framework integrates these methodologies. Conclusion: This paper provides a thorough understanding of the predominance of human factors in healthcare cyber risk and presents a sociotechnical framework for mitigation. The study enhances practice and policy by integrating behavioral insights with technical controls and policy alignment, such as compliance with HIPAA and GDPR. Subsequent research ought to investigate AI-facilitated insider detection and cross-cultural analyses of cybersecurity within the health sector.

  • Research Article
  • 10.54254/3049-7248/2025.28562
Optimization pathways for the discourse system in college ideological and political courses
  • Oct 29, 2025
  • Journal of Education and Educational Policy Studies
  • Qian Gong + 1 more

Ideological security is an integral part of national security and constitutes the spiritual foundation of the Partys governance. Marxism has always been the dominant ideology in China. Nevertheless, with the trends of economic globalization and the rise of the internet, amid profound global transformations unseen in a century, the international environment has grown increasingly complex. The diversification of social ideologies exerts significant influence on university students cognition, values, and political beliefs. Doctrines such as individualism, utilitarianism, hedonism, and populism in Western societies may easily lead to devaluation and demoralization of thought and behavior. Universities, as institutions that preserve culture, provide education, and serve society, shoulder the responsibility of safeguarding national culture and ideological security and represent a vital stronghold for promoting the socialist mainstream ideology. Ideological and political theory education in universities is a key measure to safeguard ideological security in China. The construction of ideological and political theory courses is of great practical significance for implementing the nations ideological policies and ensuring their security. It constitutes an essential component of ideological and political work in higher education and carries the mission of cultivating builders and successors of socialist modernization. Within this process, the core link lies in the discourse system of ideological and political teaching, which directly shapes the effectiveness and sustainability of these courses and related work.

  • Research Article
  • 10.26425/2658-347x-2025-8-3-34-43
The impact of digital environment, internet addiction, and digital anxiety on information security culture among generation Z managers
  • Oct 27, 2025
  • Digital Sociology
  • Z B Gasanova + 1 more

Information security culture has been studied as a systemic phenomenon that determines generation Z managers’ behavior in the digital environment. Internet addiction and digital anxiety are socio-psychological factors affecting individual digital hygiene habits and compliance with information security rules. The psychological portrait of generation Z managers has been revealed, how they differ from other generations, and what socio-psychological problems arise in this regard. Special attention has been paid to new social phenomena that have become widespread, such as the emergence of Internet addiction and digital anxiety among generation Z managers, and an explanation of these scientific terms and how they affect information security culture has been given. The structural components of information security culture (values and norms, knowledge and skills, daily practices, leadership, and organizational artifacts) and their relationship to management activities of generation Z people have been described. The analysis of what negative consequences in the context of management activities digital anxiety, Internet addiction, and digital hygiene non-observance can lead to at the level of an organization and personality as a whole has been carried out. For preventing and correcting Internet addiction and digital anxiety in generation Z managers in the context of digital hygiene and information security, a comprehensive approach to solving this scientific issue has been proposed, including both individual psychological strategies (digital detox, cognitive behavioral techniques, development of offline activities and social connections, manager’s digital hygiene, strengthening information security, and mindfulness practices), as well as organizational strategies (creating a culture of information security and digital well-being, reviewing performance metrics, and maintaining work-life balance).

  • Research Article
  • 10.33445/psssj.2025.6.3.2
Foreign Language as an Instrument of Cultural Security and Resilience Under Hybrid Threats
  • Oct 25, 2025
  • Political Science and Security Studies Journal
  • Tetiana Shmidt

The article explores the role of foreign language education as a strategic instrument of cultural security and resilience in conditions of hybrid warfare. It aims to determine how integrating linguistic and intercultural components into professional military education strengthens the ability to counter informational and cultural aggression. The study applies a combination of theoretical and empirical approaches, including analysis and systematization of Ukrainian and international research on cultural security, comparative analysis of educational practices, and abstraction, induction, and deduction to formulate conceptual and practical conclusions. The research establishes that foreign language learning, particularly through intercultural and practice-oriented methods such as role-playing games and simulations, enhances students’ critical thinking, media literacy, and intercultural competence. The experience of teaching Turkish in Ukrainian military institutions demonstrates that combining linguistic and cultural training improves officers’ readiness for communication and decision-making under hybrid conditions. The study substantiates the theoretical link between language acquisition and cultural security, expanding the understanding of language as both a communicative and strategic component of national resilience. The proposed methodology offers a framework for integrating intercultural modules into language curricula for military and higher education institutions, promoting adaptability and resilience under hybrid threats. The article provides an innovative conceptualization of foreign language learning as a tool of cultural defense, illustrating how linguistic education contributes to safeguarding national identity and resilience in the face of hybrid aggression.

  • Research Article
  • 10.69554/ksjq9958
Creating an effective cyber security culture in regulated financial services companies
  • Oct 25, 2025
  • Cyber Security: A Peer-Reviewed Journal
  • Rupert Lee-Browne

Technology-based protections are making businesses more resilient to cyberattacks. However, the rapidly improving ability for bad actors to mimic real customers and contacts across multiple vectors highlights the important role a company’s employees must play in protecting against a wide range of threats. It is not enough for staff to simply rely on robust password hygiene and the ability to spot relatively obvious inconsistencies in the approaches they attract. Today’s businesses need to make cyber security a core part of the culture of their companies so that continuous vigilance becomes an operational default. Of course, changing an existing culture is no easy undertaking. This paper analyses the issues facing one financial services business and explores step-by-step what the company did to establish and reinforce a culture of security. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.

  • Research Article
  • 10.1186/s12911-025-03007-6
Exploring information security compliant behaviors in healthcare Knowledge Process Outsourcing (KPOs)
  • Oct 24, 2025
  • BMC Medical Informatics and Decision Making
  • Charitha Mahipala + 1 more

BackgroundThe healthcare industry increasingly relies on Knowledge Process Outsourcing (KPO) to manage vast amounts of sensitive patient data. Ensuring information security compliance is critical to protecting patient privacy and maintaining data integrity. This study aims to explore the current state of information security compliance in healthcare KPOs and the factors influencing it.MethodsA quantitative approach was employed to analyze existing security policies in healthcare KPOs. Key aspects investigated include employee training, technological measures, regulatory adherence, and organizational culture. Statistical analyses were used to evaluate the relationships between these factors and their impact on compliance.ResultsThe study revealed significant gaps in security practices and compliance levels among healthcare KPOs. Employee training and organizational culture were identified as pivotal in mitigating security risks, while technology and regulatory adherence played supporting roles. The findings also highlighted best practices to enhance security compliance.Practical contributionThis study provides actionable insights for healthcare KPOs, IT security leaders, and policymakers. The results emphasize that investing in security awareness training, promoting HIS adoption, and integrating AI-driven security frameworks will be more effective than merely imposing regulations. Organizations should focus on continuous employee education, AI-powered anomaly detection, and blockchain-enhanced EHR systems to strengthen security compliance. The study’s findings serve as a roadmap for designing security policies that align with real-world operational challenges in the healthcare outsourcing sector.ConclusionsThis research provides actionable insights for KPO leaders, healthcare providers, and policymakers to strengthen information security compliance in healthcare KPOs. By addressing critical vulnerabilities and fostering a culture of security, the study contributes to safeguarding sensitive patient data amid evolving threats and regulations.Trial registrationNot applicable.Supplementary InformationThe online version contains supplementary material available at 10.1186/s12911-025-03007-6.

  • Research Article
  • 10.26689/ief.v3i9.12241
On the Role and Responsibility of Higher Education Institutions in Cultural Heritage Protection
  • Oct 16, 2025
  • International Education Forum
  • Li Shan

The protection of cultural heritage is not only a cultural work, but also a work with political significance, which is related to a country’s cultural sovereignty, cultural status, and cultural security. With the vigorous development of cultural relics protection and the continuous improvement of technological innovation capabilities, higher requirements and expectations have also been put forward for higher education institutions. This study focuses on the systematic functions and implementation paths of higher education institutions in cultural heritage protection, proposes a five-dimensional support system to ensure the implementation of responsibilities, and ultimately verifies that higher education institutions have become the core strategic force driving the sustainable development of cultural heritage by balancing the protection of historical authenticity and innovative activation and utilization.

  • Research Article
  • 10.26740/jeisbi.v6i3.65085
Analysis of Information Security Culture Among Students
  • Oct 14, 2025
  • Journal of Emerging Information Systems and Business Intelligence (JEISBI)
  • Achmad Raafiud' Cholsa + 1 more

This research aims to analyze the information security culture among university students, which is becoming increasingly important in today's digital era. In the context of increasing threats to personal data and sensitive information, understanding the culture of information security among the younger generation is crucial. The method used in this research is a quantitative survey involving 400 student respondents from various universities in Surabaya, the data is analyzed using descriptive statistical techniques to describe students' understanding, attitudes, and behavior towards information security. The results showed that students have low awareness of information security, even though they actively use digital technology. Many respondents have experienced data breaches but did not take sufficient preventive measures. The research recommends increased education and socialization about information security on campus, as well as the development of structured training programs to improve security awareness and practices among students.

  • Research Article
  • 10.5171/2025.4548925
The Impact of Leadership on Nuclear Security Culture: Qualitative Approach to the First Polish Self-Assessment at a Medical Institution Using Radioactive Sources
  • Oct 10, 2025
  • Communications of International Proceedings
  • Malgorzata Wisniewska

This study was motivated by the growing global emphasis on enhancing nuclear security culture, particularly in non-nuclear sectors such as healthcare institutions that use radioactive sources. As leadership is acknowledged as a pivotal element in the development and maintenance of a security culture, the objective of the project was to examine how leadership engagement can be executed through systematic self-assessment procedures. A notable gap in the existing literature is the lack of empirical evidence on nuclear security culture self-assessment in medical institutions, especially with respect to leadership’s role. Although theoretical models do exist, there is a shortage of documented practical implementations, particularly in Central and Eastern Europe. The methodology followed IAEA guidelines (NSS No. 7, NSS No. 28-T, NSS No. 43-T) and included the development and implementation of a tailored self-assessment questionnaire. The project involved staff members from a Polish oncology facility operated by a private healthcare provider. The participants represented several professional groups, including doctors, medical physicists, and radiological technicians. The findings of this study demonstrate that the presence of leaders who are both visible and engaged has a significant influence on the maturity of the security culture within the organization. The leaders played a pivotal role in the initiation of self-assessment, the promotion of awareness, the facilitation of training, and the sustenance of policy adherence. The findings substantiate the notion that leadership functions not only as a cultural catalyst but also as a structural facilitator of ongoing enhancement. The paper’s conclusions offer a series of recommendations with a focus on leadership, the objective of which is to more firmly establish a culture of nuclear security within organizational practices. This initiative is designed to serve as a replicable model for similar institutions around the world.

  • Research Article
  • 10.1080/13537113.2025.2563999
The Ascendance of Ethno-National Populism in Israel, 1977–2022: An Ethno-Class Analysis
  • Oct 3, 2025
  • Nationalism and Ethnic Politics
  • Yoav Peled

In 2022, Israel elected the most extreme right-wing religio-nationalist populist government in its history, which proceeded immediately to transform Israel’s constitutional law in an illiberal fashion. The electoral base of the populist political parties consists primarily of the lower ethno-class, made up mostly of Mizrahim (Jews originating in the Moslem world), whereas the upper ethno-class, made up mostly of Ashkenazim (Europeans), opposes the current government. Ethno-national populism normally feeds on economic and/or cultural insecurity caused by deindustrialization, immigration, or the empowerment, real or imaginary, of an outside group. Israel, however, does not accept non-Jewish immigrants, and ethno-national populism has persisted and gathered strength there through bad and good economic times for its base. What, then, are the reasons behind the successful populist mobilization, primarily of Mizrahim? I argue that in Israel ethno-national populism feeds on several factors: Resentment against the Ashkenazi-dominated Labor -Zionist Movement, which governed the country at the time of the Mizrahim’s arrival in the 1950s and 1960s; resource competition with the Palestinians; existential insecurity that is common to all Israeli Jews; economic liberalization, after initially hurting Mizrahim economically, has subsequently benefited many of them; much of this beneficial effect occurred under Benjamin Netanyahu as Prime Minister.

  • Research Article
  • 10.1037/fam0001409
The relation between parental marital quality and parent-child attachment security: A three-level meta-analysis.
  • Oct 2, 2025
  • Journal of family psychology : JFP : journal of the Division of Family Psychology of the American Psychological Association (Division 43)
  • Sen Li + 3 more

Parental marital quality significantly influences parent-child attachment security. Previous empirical studies have produced inconsistent conclusions regarding whether this relation is positive, as indicated by the spillover hypothesis and emotional security theory, or negative, as suggested by the compensation hypothesis. In response, this study further clarified the magnitude of the relation between parental marital quality and parent-child attachment security utilizing a three-level meta-analysis. A systematic literature search identified 69 studies involving 21,346 participants and 366 effect sizes. The analysis revealed a significant positive relation between parental marital quality and parent-child attachment security (r = 0.251, p < .001). Moreover, the present meta-analysis observed significant moderating effects concerning children's age, culture, research design, and measures of parent-child attachment security, as well as dimensions, informants, and measures of parental marital quality. These findings offer valuable insights for interventions aimed at improving parent-child attachment within the context of family dynamics. (PsycInfo Database Record (c) 2025 APA, all rights reserved).

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers