116 Hits in 6.4 sec

Individual Differences in Cyber Security

Christopher Conetta
2019 McNair Research Journal SJSU  
Individual Differences in Cyber Security Biography Christopher's belief in the importance of education stems from his roots as a first-generation college student.  ...  His research interests include: motivation, self-efficacy, personality, performance, behavior and end-users in cyber security.  ...  Intentional Cyber Security Behavior (SeBIS). To measure intent to comply with current security preventative measures, this study utilized Eagleman's Security Behavior Intention Scale (SeBIS; 2015).  ... 
doi:10.31979/mrj.2019.1504 fatcat:pv3omov36jba7e6mm62btk3fzm

Predicting privacy and security attitudes

Serge Egelman, Eyal Peer
2015 Computers & society  
security behavior intentions.  ...  We describe the results of several experiments that showed how decisionmaking style and risk-taking attitudes are strong predictors of privacy attitudes, as well as a new scale that we developed to measure  ...  all four dimensions of the Security Behavior Intentions Scale (SeBIS).  ... 
doi:10.1145/2738210.2738215 fatcat:u3lerceqmvaxdiu52fuk6bnqq4

The Myth of the Average User

Serge Egelman, Eyal Peer
2015 Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15  
and security attitudes (and ultimately behaviors).  ...  Based on this result, we introduce the new paradigm of psychographic targeting of privacy and security mitigations: we believe that the next frontier in privacy and security research will be to tailor  ...  Thus, we developed a new scale, which we are calling the Security Behavior Intentions Scale (SeBIS) [23] .  ... 
doi:10.1145/2841113.2841115 dblp:conf/nspw/EgelmanP15 fatcat:yql7xprle5fx7hzdjqbw665pae

"Security begins at home": Determinants of home computer and mobile device security behavior

Nik Thompson, Tanya Jane McGill, Xuequn Wang
2017 Computers & security  
However, perceived severity was only found to play a role in mobile device security behavior and neither response efficacy nor subjective norm influenced security intentions for either type of user.  ...  The model was separately tested with home computer users and mobile device users and data reveals that some of the determinants of security behavior differ between home computer and mobile device use.  ...  The availability of validated measures of intention such as the Security Behavior Intentions Scale (SeBIS) (Egelman & Peer, 2015) , will facilitate cross study comparisons; however, to improve understanding  ... 
doi:10.1016/j.cose.2017.07.003 fatcat:jkb7qx6nzffddf47otvoapt6su

A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues [article]

Dimitra Papatsaroucha, Yannis Nikoloudakis, Ioannis Kefaloukos, Evangelos Pallis, Evangelos K. Markakis
2021 arXiv   pre-print
Following the review of the literature, several conclusions are reached.  ...  Thus, human vulnerabilities pose a serious threat to the security and integrity of computer systems and data.  ...  Security-Related Behavior Intentions To identify a user's security-related behavior intentions, the Security Behavior Intentions Scale (SeBIS) has been developed by Egelman and Peer in [44] .  ... 
arXiv:2106.09986v2 fatcat:rurgrvdkjbcljiqoiv3ztoov4u

Cyber-Security Culture towards Digital Marketing Communications among Small and Medium-Sized (SME) Entrepreneurs

Aiman Huzrin Adleena Huzaizi, Siti Nor Amalina Ahmad Tajuddin, Khairul Azam Bahari, Kamaruzzaman Abdul Manan, Nur Nadia Abd Mubin
2021 Asian Culture and History  
This study utilized a quantitative methodology in the form of a survey, with respondents being selected at random from a list of numbers and from a box of random numbers.  ...  The objectives of this study were to identify the knowledge, attitudes, and practices of cyber-security culture toward digital marketing communications among small and medium-sized entrepreneurs in Selangor  ...  Acknowledgments This is a small-scale preliminary study that has been carried out as part of the Fundamental Research Grants Scheme (FRGS/1/2020/SS0/UPSI/02/5) provided by the Ministry of Education of  ... 
doi:10.5539/ach.v13n2p20 fatcat:xg3xak27ejhnxaci3wosqlqepy

Factors in an end user security expertise instrument

Prashanth Rajivan, Pablo Moriano, Timothy Kelley, L. Jean Camp
2017 Information and Computer Security  
Exploratory factor analysis was applied on the results from 898 participants from a wide range of populations.  ...  They can be significant determinants of human behaviour and interactions in the security and privacy context.  ...  Egelman and Peer developed the Security Behavior Intentions Scale (SeBIS), which is a 16-item, scale-based instrument to measure the intention of security rules that end users use while interacting with  ... 
doi:10.1108/ics-04-2017-0020 fatcat:3kpo67i4izcanjoykronxpcdoe

The Impact of Conditional Determinants of Purchase Attitude of Store Brands in Food and Grocery in Indian Retailing-An Empirical Study in Twin Cities of Hyderabad

Tirthala Naga Sai Kumar
2013 IOSR Journal of Business and Management  
The consumer psychology is a very complex phenomenon, which changes from time to time, and depends on fast changing applications of science &technology and ever fascinating management skills.  ...  purchase behavior of the store brand consumers.The study focuses on what-if analysis exclusively in analyzing the black box phenomena.  ...  The online shopping change the retail business model: A survey of the people use online shopping in  ... 
doi:10.9790/487x-1550107 fatcat:ttrcisn65bfdfm427usm7hfyoq

Change Management through Productive Social Networking

Prof. Yogesh Brahmankar
2012 IOSR Journal of Business and Management  
The study proposes concept of agile change management with appropriate use of technology.  ...  It also focuses on the requirement of agility in human resources or talent to have creative solutions in the direction of sustainable development.  ...  Therefore, all 20 items in the scale measuring various aspects of savings and investments are considered to be valid and reliable.  ... 
doi:10.9790/487x-0110105 fatcat:lqqgjhwsardpjdxfrh2os3uzci

Currency Risk Management Practices in India - An Evidence from the Textile Sector

Prakash Basanna, K. R. Pundareeka Vittala
2019 Indian Journal of Research in Capital Markets  
This study considered only those IPOs which satisfied the following criteria: a) The IPOs must be listed on the NSE, b) The IPOs must have recorded the issue price, listing date, issue date, price range  ...  later, six months later, and a year later of listing day during the study period.  ...  Objectives of the Study The following are the specific objectives of the study : (i) To study the behavior of equity investors in general.  ... 
doi:10.17010/ijrcm/2019/v6/i1/144038 fatcat:lw6xerjaunbwbemgxyj65lgwj4

Lessons from Four Years of PHONELAB Experimentation [article]

Jinghao Shi, Edwin Santos, Geoffrey Challen
2019 arXiv   pre-print
We also offer many lessons learned along the way, almost all of which have been learned the hard way--through trial and a lot of error.  ...  Over the last four years we have operated a public smartphone platform testbed called PHONELAB.  ...  Based on the data collected, the experimenters validated the correlation between the user's securement sub-scale of Security Behavior Intention Scale (SeBIS) [14] score and the smartphone lock screen  ... 
arXiv:1902.01929v1 fatcat:camyxnc4gfbprnvqzooreg5yoe


2017 Zenodo  
In many countries, information and communication technology (ICT) has a lucid impact on the development of educational curriculum.  ...  The current papers discuss the same along with the discussion of what factors which motivate and preventing in the use of ICT in educational field.  ...  To bring out a systematic and orderly performance study on DSR is the objective of this research.  ... 
doi:10.5281/zenodo.4249562 fatcat:6w6uv6sifrakphtw54mainnd2q

Developing a Corporate Social Responsibility Strategy in India Using the SA 8000 Standard

Federica Murmura, Laura Bravi
2020 Sustainability  
The research is based on a qualitative multiple case study. A total number of six companies participated in the research.  ...  The study shows that by certifying SA 8000, Indian textile companies want to be promoters of a more sustainable and ethical way of doing business.  ...  In India, the directive issued by Securities and Exchange Board of India (SEBI) for CSR evaluation in 2011 was the first step towards mandating CSR reporting [62] .  ... 
doi:10.3390/su12083481 fatcat:ajor7uecona7ffrxe5laiknyre

International Journal of Business and Management Research "IJBMR" 2012 Issue

2012 Zenodo  
The International Journal of Business and Management Research A refereed journal published by the International Journal of Business and Management Research "IJBMR" 2012 Issue The International Journal  ...  International Journal of Business and Management Research (IJBMR) is a peer reviewed publication.  ...  We looked at the work of others to show that combining software alone is not the only way to reduce handle time.  ... 
doi:10.5281/zenodo.5526971 fatcat:2wfwb3aobbh5vea4ioyyiyruvi

Cluster Analysis of Young Online Consumers in Indian Context

Dipanjay Bhalerao
2015 ANVESHAK-International Journal of Management  
of Security Brokers in Commodity Future market", Committee Formed by SEBI. [15] Report of the RBI-SEBI Standing Technical Committee on Exchange Traded Currency Future (2008). [16] Report of the RBI-SEBI  ...  It may be valid for use in one situation but invalid in another. Following types of validity are tested in research: content validity, construct validity and external validity.  ...  IB Trust Taking help of social media feedback for high value online buying will be safe.  ... 
doi:10.15410/aijm/2015/v4i2/67730 fatcat:77idyos2snhodduz4a7tqkpume
« Previous Showing results 1 — 15 out of 116 results