Using and managing multiple passwords: A week to a view
B Grawemeyer, H Johnson - Interacting with computers, 2011 - ieeexplore.ieee.org
Security policies are required that protect information from unauthorised access, and also
respect challenges users face in creating, and particularly managing, increasing numbers of …
respect challenges users face in creating, and particularly managing, increasing numbers of …
The role of perceived privacy and perceived security in online market
R Mekovec, Ž Hutinski - 2012 Proceedings of the 35th …, 2012 - ieeexplore.ieee.org
Individuals mostly hesitate to use services offered via Internet due to their suspicions
regarding the level of offered (1) protection of their privacy and (2) security of performing …
regarding the level of offered (1) protection of their privacy and (2) security of performing …
Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security
MKS Tan, S Goode, A Richardson - Behaviour & Information …, 2021 - Taylor & Francis
Anti-malware software must be frequently updated in order to protect the system and the
user from attack. Makers of this software must choose between interrupting the user to …
user from attack. Makers of this software must choose between interrupting the user to …
On the relationship between it privacy and security behavior: A survey among German private users
The relevance of adequate privacy and security behavior in the digital realm is higher than
ever. However, the exact relationship between privacy and security behavior is rarely …
ever. However, the exact relationship between privacy and security behavior is rarely …
Impact of Digital Literacy and Online Privacy Concerns on Cybersecurity Behaviour: The Moderating Role of Cybersecurity Awareness
M Elrayah, S Jamil - International Journal of Cyber …, 2023 - cybercrimejournal.com
Purpose: This study investigates the impact of digital literacy, citizenship, curation practices,
connectedness, and online privacy concerns on cybersecurity behaviour. It specifically …
connectedness, and online privacy concerns on cybersecurity behaviour. It specifically …
Metodologija vrjednovanja kvalitete u korištenju aplikacijama Web 2.0
T Orehovački - 2013 - repozitorij.unizg.hr
Sažetak U sklopu ovog doktorskog rada oblikovana je metodologija koja omogućava
vrjednovanje svih relevantnih pragmatičnih i hedonističkih atributa kvalitete u korištenju …
vrjednovanje svih relevantnih pragmatičnih i hedonističkih atributa kvalitete u korištenju …
Kurumsal Dijital Yeterlilik Ölçeği (KDYÖ): Bir Ölçek Geliştirme Çalışması
Kurumsal dijital yeterlilik dijital okuryazarlık, dijital liderlik, dijital inovasyon ve dijital strateji
gibi bir dizi beceriyi kapsamaktadır. Bu araştırmanın temel amacı kurumların dijital …
gibi bir dizi beceriyi kapsamaktadır. Bu araştırmanın temel amacı kurumların dijital …
Assessing the impact of affective feedback on end-user security awareness
LA Shepherd, J Archibald, RI Ferguson - … , HAS 2017, Held as Part of HCI …, 2017 - Springer
A lack of awareness regarding online security behaviour can leave users and their devices
vulnerable to compromise. This paper highlights potential areas where users may fall victim …
vulnerable to compromise. This paper highlights potential areas where users may fall victim …
New Dimension of Right to Privacy in Social Media ERA
SS Rathore - EUROPEAN JOURNAL OF INNOVATION IN …, 2023 - inovatus.es
Since the arrival of early social networking sites in the early 2000s, online social networking
platforms have expanded exponentially, with the biggest names in social media in the mid …
platforms have expanded exponentially, with the biggest names in social media in the mid …
[PDF][PDF] Factors Affecting Information Privacy and Protection Behavior on Social Network Sites
MK Ali, MK Ali, KA Hassan - … of Research and Scientific Innovation (IJRSI …, 2020 - siu.edu.so
The purpose of this study is to investigate Factors affecting information privacy and
protection behavior on social media, and perceived severity attack on information privacy in …
protection behavior on social media, and perceived severity attack on information privacy in …