[HTML][HTML] Privacy and security in mobile health (mHealth) research

S Arora, J Yttri, W Nilsen - Alcohol research: current reviews, 2014 - ncbi.nlm.nih.gov
Research on the use of mobile technologies for alcohol use problems is a developing field.
Rapid technological advances in mobile health (or mHealth) research generate both …

Leveraging human factors in cybersecurity: an integrated methodological approach

A Pollini, TC Callari, A Tedeschi, D Ruscio… - Cognition, Technology & …, 2022 - Springer
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …

Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

Understanding nonmalicious security violations in the workplace: A composite behavior model

KH Guo, Y Yuan, NP Archer… - Journal of management …, 2011 - Taylor & Francis
End users are said to be" the weakest link" in information systems (IS) security management
in the workplace. They often knowingly engage in certain insecure uses of IS and violate …

Dispositional and situational factors: influences on information security policy violations

AC Johnston, M Warkentin, M McBride… - European Journal of …, 2016 - Taylor & Francis
Insiders represent a major threat to the security of an organization's information resources.
Previous research has explored the role of dispositional and situational factors in promoting …

Personalized keystroke dynamics for self-powered human–machine interfacing

J Chen, G Zhu, J Yang, Q Jing, P Bai, W Yang, X Qi… - ACS …, 2015 - ACS Publications
The computer keyboard is one of the most common, reliable, accessible, and effective tools
used for human–machine interfacing and information exchange. Although keyboards have …

A qualitative study of users' view on information security

E Albrechtsen - Computers & security, 2007 - Elsevier
Users play an important role in the information security performance of organisations by their
security awareness and cautious behaviour. Interviews of users at an IT-company and a …

Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study

E Albrechtsen, J Hovden - Computers & Security, 2010 - Elsevier
The paper discusses and evaluates the effects of an information security awareness
programme. The programme emphasised employee participation, dialogue and collective …

Human and organizational factors in computer and information security: Pathways to vulnerabilities

S Kraemer, P Carayon, J Clem - Computers & security, 2009 - Elsevier
The purpose of this study was to identify and describe how human and organizational
factors may be related to technical computer and information security (CIS) vulnerabilities. A …

'What a waste of time': An examination of cybersecurity legitimacy

WA Cram, J D'Arcy - Information Systems Journal, 2023 - Wiley Online Library
Managers who oversee cybersecurity policies commonly rely on managerial
encouragement (eg, rewards) and employee characteristics (eg, attitude) to drive compliant …