“Security begins at home”: Determinants of home computer and mobile device security behavior
© 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they must independently make decisions about how to protect themselves, often with little understanding of technology or its implications. However, personal computing users are under-represented in securi...
| Main Authors: | Thompson, Nik, McGill, T., Wang, X. |
|---|---|
| Format: | Journal Article |
| Published: |
Elsevier Advanced Technology
2017
|
| Online Access: | http://hdl.handle.net/20.500.11937/55780 |
Similar Items
Old risks, new challenges: exploring differences in security between home computer and mobile device use
by: McGill, T., et al.
Published: (2017)
by: McGill, T., et al.
Published: (2017)
Gender Differences in Information Security Perceptions and Behaviour
by: McGill, T., et al.
Published: (2018)
by: McGill, T., et al.
Published: (2018)
Mining the Mind – Applying Quantitative Techniques to Mental Models of Security
by: Thompson, Nik, et al.
Published: (2017)
by: Thompson, Nik, et al.
Published: (2017)
Green habits begin at home
by: The Star, Edward R. Henry
Published: (2012)
by: The Star, Edward R. Henry
Published: (2012)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Integrated home security system :Module on mobile application
by: Muhammad Izzat, Ramli
Published: (2010)
by: Muhammad Izzat, Ramli
Published: (2010)
Smart home security system
by: Bahrin, Muhammad Harith, et al.
Published: (2022)
by: Bahrin, Muhammad Harith, et al.
Published: (2022)
An integrated controller for car-accessories and home/ office multimedia devices using mobile phone with security features.
by: Khatun, Sabira, et al.
Published: (2009)
by: Khatun, Sabira, et al.
Published: (2009)
Development of voice control and home security for smart home automation
by: Abidi, M.Ebrahim, et al.
Published: (2018)
by: Abidi, M.Ebrahim, et al.
Published: (2018)
Home security based on internet application
by: Ruzzaida, Kamaruldzaman
Published: (2009)
by: Ruzzaida, Kamaruldzaman
Published: (2009)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
UMP students begin returning home to cast votes
by: Mimi Rabita, Abdul Wahit
Published: (2022)
by: Mimi Rabita, Abdul Wahit
Published: (2022)
Affective Human Computer Interaction
by: Thompson, Nik, et al.
Published: (2015)
by: Thompson, Nik, et al.
Published: (2015)
Smart Home Security Using Facial Authentication
by: Rakshitha, M.V., et al.
Published: (2024)
by: Rakshitha, M.V., et al.
Published: (2024)
Vigilance home security system (VHS System)
by: Noorshafiza, Muhaidi
Published: (2011)
by: Noorshafiza, Muhaidi
Published: (2011)
Wireless based home security with automation system
by: Wan Norziela, Wan Rosli
Published: (2010)
by: Wan Norziela, Wan Rosli
Published: (2010)
Home security system using face recognition
by: Syed Syafiq, Syed Alias, et al.
Published: (2021)
by: Syed Syafiq, Syed Alias, et al.
Published: (2021)
The application of affective computing technology to e-learning
by: Thompson, Nik, et al.
Published: (2013)
by: Thompson, Nik, et al.
Published: (2013)
S.M.A.R.T Home - Security Monitoring Automation Remote Technology Home
by: Lim, Hong Guan
Published: (2017)
by: Lim, Hong Guan
Published: (2017)
Affective Stack - A Model for Affective Computing Application Development
by: Thompson, Nik, et al.
Published: (2015)
by: Thompson, Nik, et al.
Published: (2015)
Algorithms For An Integrated Vision-Based Home Security System
by: See, John Su Yang
Published: (2005)
by: See, John Su Yang
Published: (2005)
An integrated vision-based architecture for home security system
by: See, J., et al.
Published: (2007)
by: See, J., et al.
Published: (2007)
Intelligent home automation system (IHAS) with security protection
by: Neo, Chan Loong
Published: (2016)
by: Neo, Chan Loong
Published: (2016)
Professional distance-mentoring of beginning design and technology home economics teachers
by: Cooper, Martin, et al.
Published: (2014)
by: Cooper, Martin, et al.
Published: (2014)
Protecting Older People from Burglary: Prevalence of Security Devices in the Home of Older Adults in Perth, Western Australia
by: Lee, Hoe, et al.
Published: (2008)
by: Lee, Hoe, et al.
Published: (2008)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Home security sensor system using atmel AVR microcontroller
by: Lim, Boon Hoi
Published: (2006)
by: Lim, Boon Hoi
Published: (2006)
Affect-Sensitive Computer Systems
by: Thompson, Nik, et al.
Published: (2018)
by: Thompson, Nik, et al.
Published: (2018)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
Justice and home affairs: impact of the European Union on the internal security of Turkey
by: Bakar, Ayhan
Published: (2011)
by: Bakar, Ayhan
Published: (2011)
Factors Influencing The Adoption Of Internet Of Things For Home Security In Dhaka Households
by: Mahmud, Arif
Published: (2023)
by: Mahmud, Arif
Published: (2023)
“Charity Begins at Home”: Informal Caring Barriers to Formal Volunteering Among Older People
by: Pettigrew, Simone, et al.
Published: (2018)
by: Pettigrew, Simone, et al.
Published: (2018)
Development of face recognition on raspberry Pi for security enhancement of smart home system
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
NFC secured online transaction in mobile computing business
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Face Recognition For Home Security System Using Hybrid Fisher Linear Discriminant Algorithm
by: Zhi, Chua Min Zhi
Published: (2009)
by: Zhi, Chua Min Zhi
Published: (2009)
The psychosocial impact of home use medical devices
by: Thomson, Ross John
Published: (2017)
by: Thomson, Ross John
Published: (2017)
Home Fitness Mobile Application
by: Koh, Qing Zhe
Published: (2022)
by: Koh, Qing Zhe
Published: (2022)
Multimedia and cognition: Examining the effect of applying cognitive principles to the design of instructional materials
by: Thompson, Nik, et al.
Published: (2008)
by: Thompson, Nik, et al.
Published: (2008)
Affective tutoring systems: Enhancing e-learning with the emotional awareness of a human tutor
by: Thompson, Nik, et al.
Published: (2012)
by: Thompson, Nik, et al.
Published: (2012)
Similar Items
-
Old risks, new challenges: exploring differences in security between home computer and mobile device use
by: McGill, T., et al.
Published: (2017) -
Gender Differences in Information Security Perceptions and Behaviour
by: McGill, T., et al.
Published: (2018) -
Mining the Mind – Applying Quantitative Techniques to Mental Models of Security
by: Thompson, Nik, et al.
Published: (2017) -
Green habits begin at home
by: The Star, Edward R. Henry
Published: (2012) -
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)