142 Hits in 9.1 sec

Individual's Security and Privacy Behavior on the Use of Unfamiliar Wireless Networks: Habituation Theory Perspective

James Wairimu, Emmanuel Ayaburi, Francis Kofi Andoh-Baidoo
2018 International Conference on Information Systems  
Preliminary data shows that social connectedness, perceived attachment, perceptions on privacy risk, and information security self-efficacy significantly influence the use of unfamiliar wireless network  ...  Despite the imminent dangers, individuals continue to use unfamiliar networks. This study explicates a habituation theory framework to investigate routine and automatic use of unfamiliar networks.  ...  The results of our study contribute to the literature on habituation theory, privacy and risk exposure in the use of unfamiliar wireless networks.  ... 
dblp:conf/icis/WairimuAA18 fatcat:5qld5tfqzbbm7bl7tb5fkm7uey

Familiarity with Internet threats: Beyond awareness

Debora Jeske, Paul van Schaik
2017 Computers & security  
The degree of familiarity with threats is considered as a predictor of Internet attitudes and security behaviors.  ...  Second, we provide evidence that familiarity is an important mediator between Internet use and security behaviors -making this an important baseline variable to consider in terms of training on future  ...  and in relation to wireless options -and thus enable them to overcome lack of knowledge and awareness of security threats on the part of the users (e.g., Choe et al., 2013; Kruger et al., 2010; Turland  ... 
doi:10.1016/j.cose.2017.01.010 fatcat:7gioamb6mzgzbofumohjyqcpym

The Globalization of Jurisdiction

Paul Schiff Berman
2003 Social Science Research Network  
to ensure the safety and security of minors when using chat rooms); NEV.  ...  Self-help sub-routines might be used to encrypt user-files in the event of contractual violation, with the key only being provided on payment of a fee and a return to proper behavior.  ...  based on a formal territorial analysis-does not adequately capture the social meaning of jurisdiction and community definition.  ... 
doi:10.2139/ssrn.361861 fatcat:7i7qu4fodngu3iqmvrybu5ww6m

Law Student Laptop Use During Class for Non-Class Purposes: Temptation v. Incentives

Jeff Sovern
2011 Social Science Research Network  
little cognitive effort, more complex, new, or unfamiliar tasks pose a cognitive processing load that may exceed the capacity of an individual's working memory.  ...  that met before Information Technology conducted a session to introduce students to the law school's wireless network.  ... 
doi:10.2139/ssrn.1805107 fatcat:l5cdphjoyzbzfmxu6pi6b2r4kq

Populist Placemaking: Spatial Regulating to Advance Open Government-Citizen Discourse

Michael N. Widener
2017 Social Science Research Network  
One such initiative is a modular open source wireless sensor platform for building networks of sensors needing minimal power consumption.  ...  The Sections below explore perspectives on Millennial behavior from analysts of this "tranche" of Americans. "Millennials" are a much typified and diagnosed generation, beginning with Messrs.  ...  CONCLUSION Essential ingredients of place, where an individual's visceral "homecoming" occurs, include uses and activities, comfort and image, access and linkages, and sociability-inducement dimensions  ... 
doi:10.2139/ssrn.3087689 fatcat:l4lcjzhwuja33pqz3tt5uvdy5a

Digitally Connected: Global Perspectives on Youth and Digital Media

Sandra Cortesi, Urs Gasser, Gameli Adzaho, Bruce Baikie, Jacqueline Baljeu, Matthew Battles, Jacqueline Beauchere, Elsa Brown, Jane O Burns, Patrick Burton, Jasmina Byrne, Maximillion Colombo (+37 others)
2015 Social Science Research Network  
The opportunity to share our experiences with our international colleagues was invaluable, and we eagerly look forward to a collaborative future. References / Resources / Links  ...  issues of safety, security, and privacy.  ...  We all need networking to build up a career, but in environments like a slum, you need networking to survive. Your network is everything. It's your security and your insurance.  ... 
doi:10.2139/ssrn.2585686 fatcat:ehi5kz4qmrc2ni5kiqfc5btzbe

The Globalization of Jurisdiction: Cyberspace, Nation-States, and Community Definition

Paul Schiff Berman
2002 Social Science Research Network  
to ensure the safety and security of minors when using chat rooms); NEV.  ...  Self-help sub-routines might be used to encrypt user-files in the event of contractual violation, with the key only being provided on payment of a fee and a return to proper behavior.  ...  based on a formal territorial analysis-does not adequately capture the social meaning of jurisdiction and community definition.  ... 
doi:10.2139/ssrn.304621 fatcat:sajwcesd7vc47oagt7k7n3meai

Pervasive Advertising [chapter]

Jörg Müller, Florian Alt, Daniel Michelis
2011 Pervasive Advertising  
Similarly, many pervasive computing researchers and professionals are on top of the recent technological advances, but lack basic marketing and advertising expertise and therefore an understanding of how  ...  As pervasive computing technologies leave the labs, they are starting to be used for the purpose of advertising.  ...  Furthermore, we are indebted to all participants of the pervasive advertising workshop series for their contributions to the field.  ... 
doi:10.1007/978-0-85729-352-7_1 dblp:series/hci/MullerAM11a fatcat:5l6i3svtvnhgpfnhom24ydqzaq


2015 Medien & Kommunikationswissenschaft  
Grounded in a quare framework, we focus in particular on the intersectionality of race, gender, sexuality, and class in the text.  ...  The themes of heteronormativity and White queer normativity are engaged through the Black gay male characters and through the motifs of consumerism, monogamy, and marriage. We argue M&K 63.  ...  In this way, the article is an attempt of erecting boundaries in new ways and placing them in unfamiliar places through the use of alternative and alien methods, theories and styles of writing.  ... 
doi:10.5771/1615-634x-2015-1-103 fatcat:ntk6owma45em3eve4ryr3vlkcq

Who will buy smart glasses? Empirical results of two pre-market-entry studies on the role of personality in individual awareness and intended adoption of Google Glass wearables

Philipp A. Rauschnabel, Alexander Brem, Bjoern S. Ivens
2015 Computers in Human Behavior  
Then, we draw on the Big Five Model of human personality and present the results from two studies that investigate the direct and moderating effects of human personality on the awareness and innovation  ...  This article concludes with a discussion of theoretical and managerial implications for research on technology adoption, and with suggestions for avenues for future research. (P.A.  ...  usability of many services) Speed of wireless connections, social and privacy concerns Speed of mobile Internet connections (UMTS), battery power; social and privacy concerns Social and privacy  ... 
doi:10.1016/j.chb.2015.03.003 fatcat:x7wnh6lcczeqlbmxmm33mx3o3m

Social Norms in Fourth Amendment Law

Matthew Tokson, Ari Waldman
2021 Michigan law review  
Both approaches are flawed, and they have substantial negative effects for equality and privacy.  ...  It details and challenges courts' reliance on social norms in virtually every aspect of Fourth Amendment jurisprudence.  ...  Forrester, 512 F.3d 500, 510-11 (9th Cir. 2008) (ruling that agents could use a device to monitor an individual's internet and email traffic based on a prior case permitting the use of a similar device  ... 
doi:10.36644/ fatcat:wbxwqsjkljehvng4s2itsvsc2e

Health State Estimation [article]

Nitish Nag
2020 arXiv   pre-print
Experiments demonstrate the use of dense and heterogeneous real-world data from a variety of personal and environmental sensors to monitor individual cardiovascular health state.  ...  This work concludes by presenting this framework of combining the health state and personal graph model to perpetually plan and assist us in living life towards our goals.  ...  Additionally, privacy and security methods must evolve concurrently for such systems to function in the real world.  ... 
arXiv:2003.09312v1 fatcat:sm7vadoyerbf5gmeujvobcqop4

IRRODL Volume 8, Number 2; Special Issue: Mobile Learning

Various Authors
2007 International Review of Research in Open and Distance Learning  
References Abstract The successful development of mobile learning is dependent on human factors in the use of new mobile and wireless technologies.  ...  One of the major benefits of the use of mobile technology is the education of learners on the move. R. A. Aderinoye, K. O. Ojokheta, and A. A.  ...  , Network Executive at the Virtual University of Pakistan, and Steve Song, Manager of the IDRC's ICT4D Africa Programs.  ... 
doi:10.19173/irrodl.v8i2.1097 fatcat:z5zg63ciqzhoph4mm252sebwau

Health information exchange system usage patterns in three communities: Practice sites, users, patients, and data

Thomas R. Campion, Alison M. Edwards, Stephen B. Johnson, Rainu Kaushal
2013 International Journal of Medical Informatics  
Using a theoretical framework based on the social construction of technology (SCOT) and Giddens' structuration theory, the objective of the thesis is to understand the role that telehealth plays in First  ...  Conclusions: The analysis confirms some of the findings on the structural constraints of telehealth use in First Nation communities.  ...  The second arm focuses on systems or actor-network theory (ANT as it is commonly and debatably referred as) also a constructivist perspective with emphasis on the sociotechnical realm of study rather than  ... 
doi:10.1016/j.ijmedinf.2013.05.001 pmid:23743323 fatcat:n2fntd2j5zfqxpfjtqe36giufy

Correspondents Theory 1800/2000: Philosophical Reflections Upon Epistolary Technics And Praxis In The Analogue And Digital

Anthony John Charles Ross, Moss Michael, Susan Stuart
2015 Zenodo  
technological reconfiguration of social networks, and shifts in the public/private distinction.  ...  nineteenth and 21st centuries, making use of Romantic era archival letters and related materials to compare and contrast our own, Internet-enabled experience of communicating over distance.  ...  network of behavioral mechanisms that people use to achieve desired levels of social interaction.  ... 
doi:10.5281/zenodo.13889 fatcat:mzjqiccd55cmvj7yvm67wzvnlm
« Previous Showing results 1 — 15 out of 142 results