Examining the roles of students' beliefs and security concerns for using smartwatches in higher education

M Al-Emran, A Granić, MA Al-Sharafi… - Journal of Enterprise …, 2021 - emerald.com
Purpose Despite the increased use of wearables in education, little attention has been paid
to why some students are more likely to adopt smartwatches than others. The question of …

Examining students' behavior towards campus security preparedness exercise: The role of perceived risk within the theory of planned behavior

KL Tan, JKM Sia, KHD Tang - Current Psychology, 2022 - Springer
Participating in campus security preparedness exercise (CSPE) is vitally important in
addressing potential security threats and preventing critical incidents. The present study …

Understanding the disclosure of personal data online

HJ Parker, S Flowerday - Information & Computer Security, 2021 - emerald.com
Purpose Social media has created a new level of interconnected communication. However,
the use of online platforms brings about various ways in which a user's personal data can be …

A Willingness to Disclose Personal Information for Monetary Reward: A Study of Fitness Tracker Users in Thailand

C Phonthanukitithaworn, C Sellitto - SAGE Open, 2022 - journals.sagepub.com
The paper investigates a person's willingness to reveal personal information for a monetary
reward using a model that includes factors reflecting trust belief, risk belief, information type …

Understanding the role of the bring-your-own-device policy in mobile learning behavioral usage

N AL-Sous, D Almajali… - International Journal of …, 2022 - m.growingscience.com
The determinants of bring-your-own-device (BYOD) use protection intentions affecting
BYOD usage protection behaviors were examined in this study. The determinants of …

The Relationship between Consumer Awareness of Information Security, Age, and Internet of Things Product Acquisitions

S Caison - 2022 - search.proquest.com
Cyberattacks have increasingly focused on the compromise of Internet of Things (IoT)
systems. Additionally, such attacks compounded the problem of risk to data confidentiality …

[PDF][PDF] DETERMINANTS OF BYOD PROTECTION BEHAVIOR: AN EMPLOYEE'S PERSPECTIVE

IM AL-HARTHY, NORA ALI - Journal of Theoretical and Applied Information …, 2022 - jatit.org
ABSTRACT Bring Your Own Device (BYOD) allows employees to access the organizational
network via their devices/technology. This trend is beneficial to the employees in terms of …

한국거주대만인들의페이스북그룹소셜커머스이용동기와지속적이용의도에관한연구: 이용과충족이론, 기술수용모델, 계획행동이론변인을중심으로

황우념, 이정기 - 방송과커뮤니케이션, 2021 - dbpia.co.kr
이 연구는 한국 거주 외국인 (대만인) 들이 페이스북 그룹을 통해 자국 상품 (대만 상품) 을
구매하는 행위, 즉 소셜커머스를 활발히 진행하고 있다는 점에 착안했다. 이에 한국 거주 …

User privacy protection algorithm of perceptual recommendation system based on group recommendation

X Ding, X Liu - International Journal of Autonomous and …, 2020 - inderscienceonline.com
In order to overcome the problems of low recommendation quality and poor privacy
protection ability of existing user privacy protection algorithms. This paper proposes a new …

Path Updating of the Legal Ontology Model for Personal Information Protection in the Age of Big Data

W Hu - Applied Mathematics and Nonlinear Sciences - sciendo.com
This paper proposes a legal ontology model for personal information protection to extract
structured information on the high-frequency elements of common privacy leakage and data …