A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Individual's Security and Privacy Behavior on the Use of Unfamiliar Wireless Networks: Habituation Theory Perspective
2018
International Conference on Information Systems
Preliminary data shows that social connectedness, perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence the use of unfamiliar wireless network ...
Despite the imminent dangers, individuals continue to use unfamiliar networks. This study explicates a habituation theory framework to investigate routine and automatic use of unfamiliar networks. ...
The results of our study contribute to the literature on habituation theory, privacy and risk exposure in the use of unfamiliar wireless networks. ...
dblp:conf/icis/WairimuAA18
fatcat:5qld5tfqzbbm7bl7tb5fkm7uey
Familiarity with Internet threats: Beyond awareness
2017
Computers & security
The degree of familiarity with threats is considered as a predictor of Internet attitudes and security behaviors. ...
Second, we provide evidence that familiarity is an important mediator between Internet use and security behaviors -making this an important baseline variable to consider in terms of training on future ...
and in relation to wireless options -and thus enable them to overcome lack of knowledge and awareness of security threats on the part of the users (e.g., Choe et al., 2013; Kruger et al., 2010; Turland ...
doi:10.1016/j.cose.2017.01.010
fatcat:7gioamb6mzgzbofumohjyqcpym
The Globalization of Jurisdiction
2003
Social Science Research Network
to ensure the safety and security of minors when using chat rooms); NEV. ...
Self-help sub-routines might be used to encrypt user-files in the event of contractual violation, with the key only being provided on payment of a fee and a return to proper behavior. ...
based on a formal territorial analysis-does not adequately capture the social meaning of jurisdiction and community definition. ...
doi:10.2139/ssrn.361861
fatcat:7i7qu4fodngu3iqmvrybu5ww6m
Law Student Laptop Use During Class for Non-Class Purposes: Temptation v. Incentives
2011
Social Science Research Network
little cognitive effort, more complex, new, or unfamiliar tasks pose a cognitive processing load that may exceed the capacity of an individual's working memory. ...
that met before Information Technology conducted a session to introduce students to the law school's wireless network. ...
doi:10.2139/ssrn.1805107
fatcat:l5cdphjoyzbzfmxu6pi6b2r4kq
Populist Placemaking: Spatial Regulating to Advance Open Government-Citizen Discourse
2017
Social Science Research Network
One such initiative is a modular open source wireless sensor platform for building networks of sensors needing minimal power consumption. ...
The Sections below explore perspectives on Millennial behavior from analysts of this "tranche" of Americans. "Millennials" are a much typified and diagnosed generation, beginning with Messrs. ...
CONCLUSION Essential ingredients of place, where an individual's visceral "homecoming" occurs, include uses and activities, comfort and image, access and linkages, and sociability-inducement dimensions ...
doi:10.2139/ssrn.3087689
fatcat:l4lcjzhwuja33pqz3tt5uvdy5a
Digitally Connected: Global Perspectives on Youth and Digital Media
2015
Social Science Research Network
The opportunity to share our experiences with our international colleagues was invaluable, and we eagerly look forward to a collaborative future.
References / Resources / Links ...
issues of safety, security, and privacy. ...
We all need networking to build up a career, but in environments like a slum, you need networking to survive. Your network is everything. It's your security and your insurance. ...
doi:10.2139/ssrn.2585686
fatcat:ehi5kz4qmrc2ni5kiqfc5btzbe
The Globalization of Jurisdiction: Cyberspace, Nation-States, and Community Definition
2002
Social Science Research Network
to ensure the safety and security of minors when using chat rooms); NEV. ...
Self-help sub-routines might be used to encrypt user-files in the event of contractual violation, with the key only being provided on payment of a fee and a return to proper behavior. ...
based on a formal territorial analysis-does not adequately capture the social meaning of jurisdiction and community definition. ...
doi:10.2139/ssrn.304621
fatcat:sajwcesd7vc47oagt7k7n3meai
Pervasive Advertising
[chapter]
2011
Pervasive Advertising
Similarly, many pervasive computing researchers and professionals are on top of the recent technological advances, but lack basic marketing and advertising expertise and therefore an understanding of how ...
As pervasive computing technologies leave the labs, they are starting to be used for the purpose of advertising. ...
Furthermore, we are indebted to all participants of the pervasive advertising workshop series for their contributions to the field. ...
doi:10.1007/978-0-85729-352-7_1
dblp:series/hci/MullerAM11a
fatcat:5l6i3svtvnhgpfnhom24ydqzaq
Zeitschriftenlese
2015
Medien & Kommunikationswissenschaft
Grounded in a quare framework, we focus in particular on the intersectionality of race, gender, sexuality, and class in the text. ...
The themes of heteronormativity and White queer normativity are engaged through the Black gay male characters and through the motifs of consumerism, monogamy, and marriage. We argue M&K 63. ...
In this way, the article is an attempt of erecting boundaries in new ways and placing them in unfamiliar places through the use of alternative and alien methods, theories and styles of writing. ...
doi:10.5771/1615-634x-2015-1-103
fatcat:ntk6owma45em3eve4ryr3vlkcq
Who will buy smart glasses? Empirical results of two pre-market-entry studies on the role of personality in individual awareness and intended adoption of Google Glass wearables
2015
Computers in Human Behavior
Then, we draw on the Big Five Model of human personality and present the results from two studies that investigate the direct and moderating effects of human personality on the awareness and innovation ...
This article concludes with a discussion of theoretical and managerial implications for research on technology adoption, and with suggestions for avenues for future research. (P.A. ...
usability of many services)
Speed of wireless connections, social and
privacy concerns
Speed of mobile Internet
connections (UMTS),
battery power; social
and privacy concerns
Social and privacy ...
doi:10.1016/j.chb.2015.03.003
fatcat:x7wnh6lcczeqlbmxmm33mx3o3m
Social Norms in Fourth Amendment Law
2021
Michigan law review
Both approaches are flawed, and they have substantial negative effects for equality and privacy. ...
It details and challenges courts' reliance on social norms in virtually every aspect of Fourth Amendment jurisprudence. ...
Forrester, 512 F.3d 500, 510-11 (9th Cir. 2008) (ruling that agents could use a device to monitor an individual's internet and email traffic based on a prior case permitting the use of a similar device ...
doi:10.36644/mlr.120.2.social
fatcat:wbxwqsjkljehvng4s2itsvsc2e
Health State Estimation
[article]
2020
arXiv
pre-print
Experiments demonstrate the use of dense and heterogeneous real-world data from a variety of personal and environmental sensors to monitor individual cardiovascular health state. ...
This work concludes by presenting this framework of combining the health state and personal graph model to perpetually plan and assist us in living life towards our goals. ...
Additionally, privacy and security methods must evolve concurrently for such systems to function in the real world. ...
arXiv:2003.09312v1
fatcat:sm7vadoyerbf5gmeujvobcqop4
IRRODL Volume 8, Number 2; Special Issue: Mobile Learning
2007
International Review of Research in Open and Distance Learning
References Abstract The successful development of mobile learning is dependent on human factors in the use of new mobile and wireless technologies. ...
One of the major benefits of the use of mobile technology is the education of learners on the move. R. A. Aderinoye, K. O. Ojokheta, and A. A. ...
, Network Executive at the Virtual University of Pakistan, and Steve Song, Manager of the IDRC's ICT4D Africa Programs. ...
doi:10.19173/irrodl.v8i2.1097
fatcat:z5zg63ciqzhoph4mm252sebwau
Health information exchange system usage patterns in three communities: Practice sites, users, patients, and data
2013
International Journal of Medical Informatics
Using a theoretical framework based on the social construction of technology (SCOT) and Giddens' structuration theory, the objective of the thesis is to understand the role that telehealth plays in First ...
Conclusions: The analysis confirms some of the findings on the structural constraints of telehealth use in First Nation communities. ...
The second arm focuses on systems or actor-network theory (ANT as it is commonly and debatably referred as) also a constructivist perspective with emphasis on the sociotechnical realm of study rather than ...
doi:10.1016/j.ijmedinf.2013.05.001
pmid:23743323
fatcat:n2fntd2j5zfqxpfjtqe36giufy
Correspondents Theory 1800/2000: Philosophical Reflections Upon Epistolary Technics And Praxis In The Analogue And Digital
2015
Zenodo
technological reconfiguration of social networks, and shifts in the public/private distinction. ...
nineteenth and 21st centuries, making use of Romantic era archival letters and related materials to compare and contrast our own, Internet-enabled experience of communicating over distance. ...
network of behavioral mechanisms that people use to achieve desired levels of social interaction. ...
doi:10.5281/zenodo.13889
fatcat:mzjqiccd55cmvj7yvm67wzvnlm
« Previous
Showing results 1 — 15 out of 142 results