Old risks, new challenges: exploring differences in security between home computer and mobile device use
© 2017 Informa UK Limited, trading as Taylor & Francis Group Home users are particularly vulnerable to information security threats as they must make decisions about how to protect themselves, often with little knowledge of the technology. Furthermore, information for home users tends to focus...
| Main Authors: | McGill, T., Thompson, Nik |
|---|---|
| Format: | Journal Article |
| Published: |
Brill
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/55639 |
Similar Items
“Security begins at home”: Determinants of home computer and mobile device security behavior
by: Thompson, Nik, et al.
Published: (2017)
by: Thompson, Nik, et al.
Published: (2017)
Gender Differences in Information Security Perceptions and Behaviour
by: McGill, T., et al.
Published: (2018)
by: McGill, T., et al.
Published: (2018)
Mining the Mind – Applying Quantitative Techniques to Mental Models of Security
by: Thompson, Nik, et al.
Published: (2017)
by: Thompson, Nik, et al.
Published: (2017)
Affective Human Computer Interaction
by: Thompson, Nik, et al.
Published: (2015)
by: Thompson, Nik, et al.
Published: (2015)
The application of affective computing technology to e-learning
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
Affective Stack - A Model for Affective Computing Application Development
by: Thompson, Nik, et al.
Published: (2015)
by: Thompson, Nik, et al.
Published: (2015)
Affect-Sensitive Computer Systems
by: Thompson, Nik, et al.
Published: (2018)
by: Thompson, Nik, et al.
Published: (2018)
Old age home mobile application
by: Tan, Teck Wei
Published: (2024)
by: Tan, Teck Wei
Published: (2024)
Multimedia and cognition: Examining the effect of applying cognitive principles to the design of instructional materials
by: Thompson, Nik, et al.
Published: (2008)
by: Thompson, Nik, et al.
Published: (2008)
Affective tutoring systems: Enhancing e-learning with the emotional awareness of a human tutor
by: Thompson, Nik, et al.
Published: (2012)
by: Thompson, Nik, et al.
Published: (2012)
Genetics with Jean: the design, development and evaluation of an affective tutoring system
by: Thompson, Nik, et al.
Published: (2016)
by: Thompson, Nik, et al.
Published: (2016)
An open affective platform
by: Thompson, Nik, et al.
Published: (2012)
by: Thompson, Nik, et al.
Published: (2012)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
An integrated controller for car-accessories and home/ office multimedia devices using mobile phone with security features.
by: Khatun, Sabira, et al.
Published: (2009)
by: Khatun, Sabira, et al.
Published: (2009)
Information security challenge of QR codes
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Continuing Mobility and Occupational Participation Outside the Home in Old Age Is an Act of Negotiation
by: Fristedt, S., et al.
Published: (2011)
by: Fristedt, S., et al.
Published: (2011)
Mobile computing challenges
by: Moorthy, Jaysrini Mahalinga, et al.
Published: (2021)
by: Moorthy, Jaysrini Mahalinga, et al.
Published: (2021)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Integrated home security system :Module on mobile application
by: Muhammad Izzat, Ramli
Published: (2010)
by: Muhammad Izzat, Ramli
Published: (2010)
Managing children's postural risk when using mobile technology at home: Challenges and strategies
by: Ciccarelli, Marina, et al.
Published: (2015)
by: Ciccarelli, Marina, et al.
Published: (2015)
Engaging academic staff in transnational teaching: The job satisfaction challenge
by: Toohey, D., et al.
Published: (2017)
by: Toohey, D., et al.
Published: (2017)
Can Learners Become Teachers? Evaluating the Merits of Student Generated Content and Peer Assessment.
by: Murray, D., et al.
Published: (2017)
by: Murray, D., et al.
Published: (2017)
Ergonomic Study On Input-Output Devices For Mobile Computing
by: balakrishnan, Vimala
Published: (2008)
by: balakrishnan, Vimala
Published: (2008)
Fog computing, applications , security and challenges, review
by: Rahman, Gohar, et al.
Published: (2018)
by: Rahman, Gohar, et al.
Published: (2018)
Privacy Concerns and Acceptance of Government Surveillance in Australia
by: Thompson, Nik, et al.
Published: (2018)
by: Thompson, Nik, et al.
Published: (2018)
Cultural Factors and the Role of Privacy Concerns in Acceptance of Government Surveillance
by: Thompson, Nik, et al.
Published: (2020)
by: Thompson, Nik, et al.
Published: (2020)
Review on dislodgement & securement risk of peripheral intravenous Catheter/Cannula and the needs of PIVC securement device
by: Zainul Fadziruddin, Zubair Faramir, et al.
Published: (2020)
by: Zainul Fadziruddin, Zubair Faramir, et al.
Published: (2020)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Osteoporosis risk in a home care setting
by: Smith, J., et al.
Published: (2009)
by: Smith, J., et al.
Published: (2009)
Capabilities and Challenges of Mobile Computing in Construction Industry
by: Kong, Sio Kah, et al.
Published: (2022)
by: Kong, Sio Kah, et al.
Published: (2022)
Guidelines on Interaction: An exploration into implementing secondary screen experiences on mobile devices
by: Bradford, Jordan
Published: (2013)
by: Bradford, Jordan
Published: (2013)
Exploring a 'plug and play' smart home system for mobile user
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
“You might judge me!”: parents’ mobile device use with young children with SEND at home
by: Saracoglu, Yunus
Published: (2025)
by: Saracoglu, Yunus
Published: (2025)
Authentication securing methods for mobile identity: issues, solutions and challenges
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
Fire safety system in old folk home / Syafinaz Ghani
by: Ghani, Syafinaz
Published: (2014)
by: Ghani, Syafinaz
Published: (2014)
Security issues in 5G device to device communication
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Similar Items
-
“Security begins at home”: Determinants of home computer and mobile device security behavior
by: Thompson, Nik, et al.
Published: (2017) -
Gender Differences in Information Security Perceptions and Behaviour
by: McGill, T., et al.
Published: (2018) -
Mining the Mind – Applying Quantitative Techniques to Mental Models of Security
by: Thompson, Nik, et al.
Published: (2017) -
Affective Human Computer Interaction
by: Thompson, Nik, et al.
Published: (2015) -
The application of affective computing technology to e-learning
by: Thompson, Nik, et al.
Published: (2013)