Access the full text.
Sign up today, get unlimited access with DeepDyve Pro!
technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat ...
analyses in the scientific literature the intrusiveness generated by aggregations of personal data, the responsibility for data protection and user's perception of these issues. It presents further ...
of theoretical and empirical research on how patients perceive the PHR and the differences in perceptions between users and non- users of the PHR. Objective: To apply a theoretical model, the diffusion ...
media to assess the public perceptions of the IoT. One of these two works is by [20], who analysed a small dataset of 40K tweets covering two months in 2016, examining among others the most frequent users ...
, originating through the security errors of individual computer users . Thus, aspects of national cybersecurity can often critically depend on the personal attitudes and behavior of average citizens connecting ...
perceptions and practices among Indian internet users and the extent of reliance on various sources of information. Materials and methods The study was conducted in two distinct phases. I. In the first phase ...
attack is more inclined to make greater sacrifices for security than a person who perceives a smaller likelihood of being targeted. Likewise, internet users who perceive more severe consequences ...
users who are taking advantage of the benefits of internet -aided globalization. In order to carry out the survey questionnaire, the authors applied a CAWI (Computer Associated Web Interview) method ...
which can lead to what is known as ‘Malvertising’. Malvertising is a known security threat which can involve normal users as well as persons with visual impairments. Massive malvertising attack was seen ...
the capabilities of a deletion function when its effects are transparently explained in the application’s user interface. Introduction As internet -connected smartphones are prevalent nowadays, instant messaging ...
Access the full text.
Sign up today, get unlimited access with DeepDyve Pro!