[HTML][HTML] Privacy and security in mobile health (mHealth) research
Research on the use of mobile technologies for alcohol use problems is a developing field.
Rapid technological advances in mobile health (or mHealth) research generate both …
Rapid technological advances in mobile health (or mHealth) research generate both …
Leveraging human factors in cybersecurity: an integrated methodological approach
Abstract Computer and Information Security (CIS) is usually approached adopting a
technology-centric viewpoint, where the human components of sociotechnical systems are …
technology-centric viewpoint, where the human components of sociotechnical systems are …
Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
Understanding nonmalicious security violations in the workplace: A composite behavior model
End users are said to be" the weakest link" in information systems (IS) security management
in the workplace. They often knowingly engage in certain insecure uses of IS and violate …
in the workplace. They often knowingly engage in certain insecure uses of IS and violate …
Dispositional and situational factors: influences on information security policy violations
Insiders represent a major threat to the security of an organization's information resources.
Previous research has explored the role of dispositional and situational factors in promoting …
Previous research has explored the role of dispositional and situational factors in promoting …
Personalized keystroke dynamics for self-powered human–machine interfacing
The computer keyboard is one of the most common, reliable, accessible, and effective tools
used for human–machine interfacing and information exchange. Although keyboards have …
used for human–machine interfacing and information exchange. Although keyboards have …
A qualitative study of users' view on information security
E Albrechtsen - Computers & security, 2007 - Elsevier
Users play an important role in the information security performance of organisations by their
security awareness and cautious behaviour. Interviews of users at an IT-company and a …
security awareness and cautious behaviour. Interviews of users at an IT-company and a …
Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study
E Albrechtsen, J Hovden - Computers & Security, 2010 - Elsevier
The paper discusses and evaluates the effects of an information security awareness
programme. The programme emphasised employee participation, dialogue and collective …
programme. The programme emphasised employee participation, dialogue and collective …
Human and organizational factors in computer and information security: Pathways to vulnerabilities
The purpose of this study was to identify and describe how human and organizational
factors may be related to technical computer and information security (CIS) vulnerabilities. A …
factors may be related to technical computer and information security (CIS) vulnerabilities. A …
'What a waste of time': An examination of cybersecurity legitimacy
Managers who oversee cybersecurity policies commonly rely on managerial
encouragement (eg, rewards) and employee characteristics (eg, attitude) to drive compliant …
encouragement (eg, rewards) and employee characteristics (eg, attitude) to drive compliant …