Wearable activity trackers: A survey on utility, privacy, and security

K Salehzadeh Niksirat, L Velykoivanenko… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, wearable activity trackers (WATs) have become increasingly popular.
However, despite many research studies in different fields (eg psychology, health, and …

[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

The mediating role of security anxiety in internet threat avoidance behavior

X Wang, Y Li, HJ Khasraghi, C Trumbach - Computers & Security, 2023 - Elsevier
In the prior technology threat avoidance literature, inconsistent results are found in
examining the relationships between individuals' perceived susceptibility, perceived …

Algorithm aversion to mobile clinical decision support among clinicians: a choice-based conjoint analysis

S Bankuoru Egala, D Liang - European Journal of Information …, 2024 - Taylor & Francis
Artificial intelligence has pervaded clinical decision support systems driven by algorithms. In
healthcare, algorithmic decision-making is said to outperform clinicians in their treatment …

Approaching IT security & avoiding threats in the smart home context

A Nehme, JF George - Journal of Management Information …, 2022 - Taylor & Francis
Not securing smart home devices has proven a threat to cyberspace. This has underscored
the importance of using fear appeals to promote users' information security behavior. We …

[HTML][HTML] Is the digital security act 2018 sufficient to avoid cyberbullying in Bangladesh? A quantitative study on young women from generation-z of Dhaka city

A Mahmud, JB Sweety, A Hossain, MH Husin - Computers in Human …, 2023 - Elsevier
Purpose Cyberbullying has yet to be thoroughly investigated from the perspective of Gen-Z
women, and it is vital to determine how this law influences these young women to avoid …

Optimistic bias and exposure affect security incidents on home computer

B Hewitt, GL White - Journal of Computer Information Systems, 2022 - Taylor & Francis
Individuals who are optimistically biased believe that they are less likely to experience an
adverse event or more likely to experience a positive event than their peers. This paper …

The influence of big data-enabled price discrimination on tourists' continuance usage intention to mobile applications: a technology threat avoidance perspective

Y Shang, F Li, Q Su - Current Issues in Tourism, 2023 - Taylor & Francis
Though an increasing number of tourists are experiencing big data-enabled price
discrimination, the influence of big data-enabled price discrimination on tourists' …

Factors influencing security incidents on personal computing devices

B Hewitt, G White - Journal of Organizational and End User …, 2021 - igi-global.com
Organizations expect their employees to connect securely to the organization's computer
systems. Often these employees use their personal computers to access the organization's …

Security behaviour of mobile financial service users

E Dzidzah, K Owusu Kwateng… - Information & Computer …, 2020 - emerald.com
Purpose The inception of mobile financial services (MFSs) has positively provoked
economic growth and productivity, nonetheless, it has pessimistically caused an upward …