A call for research on home users' information security behaviour

被引:0
|
作者
Department of Information Processing Science, University of Oulu, Oulu, Finland [1 ]
机构
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
15th Pacific Asia Conference on Information Systems: Quality Research in Pacific, PACIS 2011
中图分类号
学科分类号
摘要
Behavioral research - Security of data - Information systems - Personal computers - Information use
引用
收藏
相关论文
共 50 条
  • [31] Research on Smart Home Security System Based on BP Neural Network Information Fusion
    Wang, Yongliang
    Lv, Huimin
    Zhang, Qi
    Wang, Pengfei
    Yan, Daliang
    Lu, Dengcheng
    2018 CHINESE AUTOMATION CONGRESS (CAC), 2018, : 1381 - 1384
  • [32] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321
  • [33] Improving smart home security; integrating behaviour prediction into smart home
    Jose, Arun Cyril
    Malekian, Reza
    Letswamotse, Babedi B.
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2018, 28 (04) : 253 - 269
  • [34] Assessing users' privacy and security concerns of smart home technologies
    Zimmermann V.
    Gerber P.
    Marky K.
    Böck L.
    Kirchbuchner F.
    i-com, 2020, 18 (03) : 197 - 216
  • [35] Security guideline tool for home users based on international standards
    Horacio G.
    Caceres R.
    Teshigawara Y.
    Information Management and Computer Security, 2010, 18 (02): : 101 - 123
  • [36] Empirical Research in Information Security
    Weippl, Edgar
    16TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS 2014), 2014, : 4 - 4
  • [37] Research on information security model
    Jiang, Tao
    Li, Xinman
    Liu, Jiren
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (10): : 1078 - 1081
  • [38] INFORMATION NEEDS OF USERS IN TEXTILE RESEARCH
    MANUKYAN, GY
    NAUCHNO-TEKHNICHESKAYA INFORMATSIYA SERIYA 1-ORGANIZATSIYA I METODIKA INFORMATSIONNOI RABOTY, 1976, (10): : 8 - 13
  • [39] Information Security Application Design: Understanding Your Users
    Bhattarai, Ranjan
    Joyce, Ger
    Dutta, Saurabh
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 103 - 113
  • [40] Reaction of users as potential victims of information security breach
    Janjarasjit, Suparak
    Chan, Siew H.
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (01) : 187 - 206