Know your enemy: user segmentation based on human aspects of information security
Users of information systems are the weakest link in information security. Considering their
current information security performance is essential for improving information security …
current information security performance is essential for improving information security …
Incorporating heterogeneity of travelers' preferences into the overall hostel performance rating
M Kuzmanović, M Vukić - Decision Making: Applications in …, 2021 - dmame-journal.org
Hostels have become a very popular form of accommodation and their varieties have grown
steadily in recent years. To ensure the sustainability of this business model, it is necessary to …
steadily in recent years. To ensure the sustainability of this business model, it is necessary to …
[PDF][PDF] User attitudes towards controls for ad interests estimated on-device by the browser
F Lachner, MYC Cheng… - Proc. Symp. Usable …, 2023 - ndss-symposium.org
Online behavioral advertising is a double-edged sword. While relevant display ads are
generally considered useful, opaque tracking based on third-party cookies has reached …
generally considered useful, opaque tracking based on third-party cookies has reached …
Privacy in times of COVID-19: A pilot study in the republic of Ireland
G Xie, P Lohar, C Florea, M Bendechache… - Proceedings of the 16th …, 2021 - dl.acm.org
Contact tracing apps used in tracing and mitigating the spread of COVID-19 have sparked
discussions and controversies worldwide with major concerns around privacy. COVID …
discussions and controversies worldwide with major concerns around privacy. COVID …
Employees' privacy perceptions: exploring the dimensionality and antecedents of personal data sensitivity and willingness to disclose
The processing of employees' personal data is dramatically increasing, yet there is a lack of
tools that allow employees to manage their privacy. In order to develop these tools, one …
tools that allow employees to manage their privacy. In order to develop these tools, one …
Public attitudes towards privacy in COVID-19 times in the Republic of Ireland: A pilot study
M Bendechache, P Lohar, G Xie… - … Security Journal: A …, 2021 - Taylor & Francis
This research focuses on designing methods aimed at assessing Irish public attitudes
regarding privacy in COVID-19 times and their influence on the adoption of COVID-19 …
regarding privacy in COVID-19 times and their influence on the adoption of COVID-19 …
Investigation of Information Privacy in Employment: Fundamental Knowledge and Practical Solutions for the Human-Centered Design of Measures to Preserve the …
J Tolsdorf - 2022 - ediss.uni-goettingen.de
The processing of employee personal data is dramatically increasing. To protect employees'
fundamental right to privacy, the law provides for the implementation of privacy controls …
fundamental right to privacy, the law provides for the implementation of privacy controls …
[PDF][PDF] Consumers' Purchase Behavior Preference in E-Commerce Platform Based on Data Mining Algorithm
W Yang, J Guo - International Journal of Circuits, Systems and …, 2022 - npublications.com
E-commerce platform can recommend products to users by analyzing consumers' purchase
behavior preference. In the clustering process, the existing methods of purchasing behavior …
behavior preference. In the clustering process, the existing methods of purchasing behavior …
[PDF][PDF] A discovery method for new words from mobile product comments.
HY Zhu, X Yin, S Zhang, Z Wei, G Zhu… - … Systems Science & …, 2020 - cdn.techscience.cn
A large number of new words in product reviews generated by mobile terminals are valuable
indicators of the privacy preferences of customers. By clustering these privacy preferences …
indicators of the privacy preferences of customers. By clustering these privacy preferences …
The Subjective Value of Privacy
L Antoine - Springer
When in June 2013, the Washington Post and the Guardian published the initial details of
the extensive state surveillance programs of the United States and its partners, obtained …
the extensive state surveillance programs of the United States and its partners, obtained …