A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Individual Differences in Cyber Security
2019
McNair Research Journal SJSU
Individual Differences in Cyber Security Biography Christopher's belief in the importance of education stems from his roots as a first-generation college student. ...
His research interests include: motivation, self-efficacy, personality, performance, behavior and end-users in cyber security. ...
Intentional Cyber Security Behavior (SeBIS). To measure intent to comply with current security preventative measures, this study utilized Eagleman's Security Behavior Intention Scale (SeBIS; 2015). ...
doi:10.31979/mrj.2019.1504
fatcat:pv3omov36jba7e6mm62btk3fzm
Predicting privacy and security attitudes
2015
Computers & society
security behavior intentions. ...
We describe the results of several experiments that showed how decisionmaking style and risk-taking attitudes are strong predictors of privacy attitudes, as well as a new scale that we developed to measure ...
all four dimensions of the Security Behavior Intentions Scale (SeBIS). ...
doi:10.1145/2738210.2738215
fatcat:u3lerceqmvaxdiu52fuk6bnqq4
The Myth of the Average User
2015
Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15
and security attitudes (and ultimately behaviors). ...
Based on this result, we introduce the new paradigm of psychographic targeting of privacy and security mitigations: we believe that the next frontier in privacy and security research will be to tailor ...
Thus, we developed a new scale, which we are calling the Security Behavior Intentions Scale (SeBIS) [23] . ...
doi:10.1145/2841113.2841115
dblp:conf/nspw/EgelmanP15
fatcat:yql7xprle5fx7hzdjqbw665pae
"Security begins at home": Determinants of home computer and mobile device security behavior
2017
Computers & security
However, perceived severity was only found to play a role in mobile device security behavior and neither response efficacy nor subjective norm influenced security intentions for either type of user. ...
The model was separately tested with home computer users and mobile device users and data reveals that some of the determinants of security behavior differ between home computer and mobile device use. ...
The availability of validated measures of intention such as the Security Behavior Intentions Scale (SeBIS) (Egelman & Peer, 2015) , will facilitate cross study comparisons; however, to improve understanding ...
doi:10.1016/j.cose.2017.07.003
fatcat:jkb7qx6nzffddf47otvoapt6su
A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues
[article]
2021
arXiv
pre-print
Following the review of the literature, several conclusions are reached. ...
Thus, human vulnerabilities pose a serious threat to the security and integrity of computer systems and data. ...
Security-Related Behavior Intentions To identify a user's security-related behavior intentions, the Security Behavior Intentions Scale (SeBIS) has been developed by Egelman and Peer in [44] . ...
arXiv:2106.09986v2
fatcat:rurgrvdkjbcljiqoiv3ztoov4u
Cyber-Security Culture towards Digital Marketing Communications among Small and Medium-Sized (SME) Entrepreneurs
2021
Asian Culture and History
This study utilized a quantitative methodology in the form of a survey, with respondents being selected at random from a list of numbers and from a box of random numbers. ...
The objectives of this study were to identify the knowledge, attitudes, and practices of cyber-security culture toward digital marketing communications among small and medium-sized entrepreneurs in Selangor ...
Acknowledgments This is a small-scale preliminary study that has been carried out as part of the Fundamental Research Grants Scheme (FRGS/1/2020/SS0/UPSI/02/5) provided by the Ministry of Education of ...
doi:10.5539/ach.v13n2p20
fatcat:xg3xak27ejhnxaci3wosqlqepy
Factors in an end user security expertise instrument
2017
Information and Computer Security
Exploratory factor analysis was applied on the results from 898 participants from a wide range of populations. ...
They can be significant determinants of human behaviour and interactions in the security and privacy context. ...
Egelman and Peer developed the Security Behavior Intentions Scale (SeBIS), which is a 16-item, scale-based instrument to measure the intention of security rules that end users use while interacting with ...
doi:10.1108/ics-04-2017-0020
fatcat:3kpo67i4izcanjoykronxpcdoe
The Impact of Conditional Determinants of Purchase Attitude of Store Brands in Food and Grocery in Indian Retailing-An Empirical Study in Twin Cities of Hyderabad
2013
IOSR Journal of Business and Management
The consumer psychology is a very complex phenomenon, which changes from time to time, and depends on fast changing applications of science &technology and ever fascinating management skills. ...
purchase behavior of the store brand consumers.The study focuses on what-if analysis exclusively in analyzing the black box phenomena. ...
The online shopping change the retail business model: A survey of the people use online shopping in www.iosrjournals.org ...
doi:10.9790/487x-1550107
fatcat:ttrcisn65bfdfm427usm7hfyoq
Change Management through Productive Social Networking
2012
IOSR Journal of Business and Management
The study proposes concept of agile change management with appropriate use of technology. ...
It also focuses on the requirement of agility in human resources or talent to have creative solutions in the direction of sustainable development. ...
Therefore, all 20 items in the scale measuring various aspects of savings and investments are considered to be valid and reliable. ...
doi:10.9790/487x-0110105
fatcat:lqqgjhwsardpjdxfrh2os3uzci
Currency Risk Management Practices in India - An Evidence from the Textile Sector
2019
Indian Journal of Research in Capital Markets
This study considered only those IPOs which satisfied the following criteria: a) The IPOs must be listed on the NSE, b) The IPOs must have recorded the issue price, listing date, issue date, price range ...
later, six months later, and a year later of listing day during the study period. ...
Objectives of the Study The following are the specific objectives of the study : (i) To study the behavior of equity investors in general. ...
doi:10.17010/ijrcm/2019/v6/i1/144038
fatcat:lw6xerjaunbwbemgxyj65lgwj4
Lessons from Four Years of PHONELAB Experimentation
[article]
2019
arXiv
pre-print
We also offer many lessons learned along the way, almost all of which have been learned the hard way--through trial and a lot of error. ...
Over the last four years we have operated a public smartphone platform testbed called PHONELAB. ...
Based on the data collected, the experimenters validated the correlation between the user's securement sub-scale of Security Behavior Intention Scale (SeBIS) [14] score and the smartphone lock screen ...
arXiv:1902.01929v1
fatcat:camyxnc4gfbprnvqzooreg5yoe
IMPACT OF INFORMATION COMMUNICATION TECHNOLOGY (ICT) ON EDUCATION SECTOR
2017
Zenodo
In many countries, information and communication technology (ICT) has a lucid impact on the development of educational curriculum. ...
The current papers discuss the same along with the discussion of what factors which motivate and preventing in the use of ICT in educational field. ...
To bring out a systematic and orderly performance study on DSR is the objective of this research. ...
doi:10.5281/zenodo.4249562
fatcat:6w6uv6sifrakphtw54mainnd2q
Developing a Corporate Social Responsibility Strategy in India Using the SA 8000 Standard
2020
Sustainability
The research is based on a qualitative multiple case study. A total number of six companies participated in the research. ...
The study shows that by certifying SA 8000, Indian textile companies want to be promoters of a more sustainable and ethical way of doing business. ...
In India, the directive issued by Securities and Exchange Board of India (SEBI) for CSR evaluation in 2011 was the first step towards mandating CSR reporting [62] . ...
doi:10.3390/su12083481
fatcat:ajor7uecona7ffrxe5laiknyre
International Journal of Business and Management Research "IJBMR" 2012 Issue
2012
Zenodo
The International Journal of Business and Management Research A refereed journal published by the International Journal of Business and Management Research "IJBMR" 2012 Issue The International Journal ...
International Journal of Business and Management Research (IJBMR) is a peer reviewed publication. ...
We looked at the work of others to show that combining software alone is not the only way to reduce handle time. ...
doi:10.5281/zenodo.5526971
fatcat:2wfwb3aobbh5vea4ioyyiyruvi
Cluster Analysis of Young Online Consumers in Indian Context
2015
ANVESHAK-International Journal of Management
of Security Brokers in Commodity Future market", Committee Formed by SEBI. [15] Report of the RBI-SEBI Standing Technical Committee on Exchange Traded Currency Future (2008). [16] Report of the RBI-SEBI ...
It may be valid for use in one situation but invalid in another. Following types of validity are tested in research: content validity, construct validity and external validity. ...
IB Trust Taking help of social media feedback for high value online buying will be safe. ...
doi:10.15410/aijm/2015/v4i2/67730
fatcat:77idyos2snhodduz4a7tqkpume
« Previous
Showing results 1 — 15 out of 116 results