Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment
The unauthorized use of personal information belonging to users of apps integrated with the
Facebook platform affects millions of users. Crucially, although privacy concerns and …
Facebook platform affects millions of users. Crucially, although privacy concerns and …
I shall, we shall, and all others will: paradoxical information security behaviour
I shall, we shall, and all others will: paradoxical information security behaviour | Emerald Insight
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …
Books and journals Case studies Expert Briefings Open Access Publish with us Advanced …
Behavioural threshold analysis: methodological and practical considerations for applications in information security
The application of behavioural threshold analysis to analyse group behaviour in information
security presents a unique challenge in terms of the measurement instruments and …
security presents a unique challenge in terms of the measurement instruments and …
Acquiring sentiment towards information security policies through affective computing
Information security policies (ISPs) are formalised rules and regulations to which users or
employees are required to adhere to in order to safeguard information technology assets. It …
employees are required to adhere to in order to safeguard information technology assets. It …
[PDF][PDF] Deep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a
central theme in many research studies. One of the essential tools available that can be …
central theme in many research studies. One of the essential tools available that can be …
Information Security Behavioural Threshold Analysis: An Application in the South African Retail Sector
N Makhubalo, D Snyman - International Symposium on Human Aspects of …, 2024 - Springer
The African continent is a veritable cornucopia of opportunity for information security threat
actors with large number of organisations that fall victim to security attacks and breaches …
actors with large number of organisations that fall victim to security attacks and breaches …
Social Influence in Customer-Robot Interactions
M Hannig, RM Stock-Homburg - 2023 - aisel.aisnet.org
This paper focuses on social influence in customer-robot interactions. Drawing on social
impact theory and the computers-are-social-actors (CASA) paradigm, we argue that …
impact theory and the computers-are-social-actors (CASA) paradigm, we argue that …
" Cookies? I don't even know what that is."-Online focus groups on adolescents' experience and behavior in the digital space: „Cookies? Ich weiß nicht mal, was das ist …
Adolescents and young adults spend a lot of time on the Internet, yet they are not always
aware of their associated rights and obligations. Topics such as data security often get …
aware of their associated rights and obligations. Topics such as data security often get …
[引用][C] Personality-Based Surveillance Model for Facebook Apps
KA Van der Schiff - 2019 - Rhodes University Press