Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment

K van der Schyff, S Flowerday, PB Lowry - Heliyon, 2020 - cell.com
The unauthorized use of personal information belonging to users of apps integrated with the
Facebook platform affects millions of users. Crucially, although privacy concerns and …

I shall, we shall, and all others will: paradoxical information security behaviour

DP Snyman, H Kruger, WD Kearney - Information & Computer …, 2018 - emerald.com
I shall, we shall, and all others will: paradoxical information security behaviour | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …

Behavioural threshold analysis: methodological and practical considerations for applications in information security

D Snyman, H Kruger - Behaviour & Information Technology, 2019 - Taylor & Francis
The application of behavioural threshold analysis to analyse group behaviour in information
security presents a unique challenge in terms of the measurement instruments and …

Acquiring sentiment towards information security policies through affective computing

H Kruger, T du Toit, L Drevin… - 2020 2nd International …, 2020 - ieeexplore.ieee.org
Information security policies (ISPs) are formalised rules and regulations to which users or
employees are required to adhere to in order to safeguard information technology assets. It …

[PDF][PDF] Deep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies

T du Toit, H Kruger, L Drevin, N Maree - Advances in Science …, 2022 - academia.edu
Information security behaviour is an integral part of modern business and has become a
central theme in many research studies. One of the essential tools available that can be …

Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector

N Makhubalo, D Snyman - International Symposium on Human Aspects of …, 2024 - Springer
The African continent is a veritable cornucopia of opportunity for information security threat
actors with large number of organisations that fall victim to security attacks and breaches …

Social Influence in Customer-Robot Interactions

M Hannig, RM Stock-Homburg - 2023 - aisel.aisnet.org
This paper focuses on social influence in customer-robot interactions. Drawing on social
impact theory and the computers-are-social-actors (CASA) paradigm, we argue that …

" Cookies? I don't even know what that is."-Online focus groups on adolescents' experience and behavior in the digital space: „Cookies? Ich weiß nicht mal, was das ist …

A Kreuder, L Haehn, J KlüTsch, SJ Schlittmeier… - Proceedings of Mensch …, 2023 - dl.acm.org
Adolescents and young adults spend a lot of time on the Internet, yet they are not always
aware of their associated rights and obligations. Topics such as data security often get …

[引用][C] Personality-Based Surveillance Model for Facebook Apps

KA Van der Schiff - 2019 - Rhodes University Press