Wearable activity trackers: A survey on utility, privacy, and security
K Salehzadeh Niksirat, L Velykoivanenko… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, wearable activity trackers (WATs) have become increasingly popular.
However, despite many research studies in different fields (eg psychology, health, and …
However, despite many research studies in different fields (eg psychology, health, and …
[HTML][HTML] The whole of cyber defense: Syncing practice and theory
KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …
cyber professionals face when defending their organization against cyberattacks. Using a …
The mediating role of security anxiety in internet threat avoidance behavior
In the prior technology threat avoidance literature, inconsistent results are found in
examining the relationships between individuals' perceived susceptibility, perceived …
examining the relationships between individuals' perceived susceptibility, perceived …
Algorithm aversion to mobile clinical decision support among clinicians: a choice-based conjoint analysis
S Bankuoru Egala, D Liang - European Journal of Information …, 2024 - Taylor & Francis
Artificial intelligence has pervaded clinical decision support systems driven by algorithms. In
healthcare, algorithmic decision-making is said to outperform clinicians in their treatment …
healthcare, algorithmic decision-making is said to outperform clinicians in their treatment …
Approaching IT security & avoiding threats in the smart home context
Not securing smart home devices has proven a threat to cyberspace. This has underscored
the importance of using fear appeals to promote users' information security behavior. We …
the importance of using fear appeals to promote users' information security behavior. We …
[HTML][HTML] Is the digital security act 2018 sufficient to avoid cyberbullying in Bangladesh? A quantitative study on young women from generation-z of Dhaka city
Purpose Cyberbullying has yet to be thoroughly investigated from the perspective of Gen-Z
women, and it is vital to determine how this law influences these young women to avoid …
women, and it is vital to determine how this law influences these young women to avoid …
Optimistic bias and exposure affect security incidents on home computer
Individuals who are optimistically biased believe that they are less likely to experience an
adverse event or more likely to experience a positive event than their peers. This paper …
adverse event or more likely to experience a positive event than their peers. This paper …
The influence of big data-enabled price discrimination on tourists' continuance usage intention to mobile applications: a technology threat avoidance perspective
Though an increasing number of tourists are experiencing big data-enabled price
discrimination, the influence of big data-enabled price discrimination on tourists' …
discrimination, the influence of big data-enabled price discrimination on tourists' …
Factors influencing security incidents on personal computing devices
Organizations expect their employees to connect securely to the organization's computer
systems. Often these employees use their personal computers to access the organization's …
systems. Often these employees use their personal computers to access the organization's …
Security behaviour of mobile financial service users
E Dzidzah, K Owusu Kwateng… - Information & Computer …, 2020 - emerald.com
Purpose The inception of mobile financial services (MFSs) has positively provoked
economic growth and productivity, nonetheless, it has pessimistically caused an upward …
economic growth and productivity, nonetheless, it has pessimistically caused an upward …