22 Hits in 4.2 sec

A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach in Search Advertising

Jian Mou, Pusan National University, Republic of Korea, Jason Cohen, Anol Bhattacherjee, Jongki Kim, University of the Witwatersrand, South Africa, University of South Florida, USA, Pusan National University, Republic of Korea
2022 Journal of the AIS  
Ninety-two published studies were meta-analyzed and estimated using structural equation modeling.  ...  Information security is one of the important domains of information systems research today, with protection motivation theory (PMT) one of its most influential theoretical lenses.  ...  We also thank the reviewers and participants at ICIS 2017 for their comments on an early version of this work.  ... 
doi:10.17705/1jais.00723 fatcat:macmycdzm5aubef4ne4s46poeq

The Work of Cybersecurity Advocates [article]

Julie Marie Haney, Maryland Shared Open Access Repository, Wayne G. ; Lutters
approaches via a case study of a security awareness team at a U.S. government agency.  ...  Since this interview data was one-sided from the perspective of advocates themselves, I validated the findings with a second stage exploring the effectiveness of advocates?  ...  In contrast, the case study was bounded, context-specific, and longitudinal over the course of a year.  ... 
doi:10.13016/m2tdqe-ygph fatcat:7grvlvrbr5ha3ii7u4jirockla

Security Enhancement of an Automated Teller Machine Using Fingerprint and Password

C. Nwankwo, Augustine University, Epe, Lagos State, Nigeria, G. Oletu, O.B. Longe
2020 Advances in Multidisciplinary & Scientific Research Journal Publication  
This paper focuses on how to enhanced security of Transactions in Automatic Teller Machine system using a multi-factor authentication system (Password and Fingerprint).  ...  After authorized verification, the customer will be able to proceed for transaction else after four successive wrong attempts, the ATM card will be ejected automatically and a message will be sent to the  ...  Image, One Time Password generated to users' phone. and another One Time Password given by the user to the server for authentication to secure Banking, this was related to the security issues associated  ... 
doi:10.22624/isteams/v26p5-ieee-ng-ts fatcat:5mrlw7sebncwhn4qhjpqc5eir4

List of Contributors [chapter]

Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
2019 Big Data Security  
Several new studies on big data provenance are not comprehensive in view of the fact that we spotlight on those that are in the circumstance of DDP also, and that have test analysis.  ...  Phishing One of the online' s most prominent and prevalent type of manipulation attack dependent on directly reaching the user via mailbox or messaging services can be defined as attack style of phishing  ...  The need for developing data-driven algorithms for creating applications on several other fields can open a new field of study.  ... 
doi:10.1515/9783110606058-202 fatcat:3jtqdtgsavas7n3vxrtbrkdbdy

Environmental Psychology: Not Just for Hippies

Ethan A. McMahan
2021 Eye on Psi Chi Magazine  
The pub li ca tion schedule fol lows the ac a dem ic year: fall, win ter, spring, and summer.  ...  Regarding young adults, Rullestad et al. (2021) completed a two-year longitudinal study of 1,225 Norwegian students in grades 6 through 10.  ...  Light some incense, put your Chaco-clad feet up, grab a yerba matte, play some Phish radio on your Spotify, and tuck in to some articles on environmental psychology.  ... 
doi:10.24839/2164-9812.eye26.1.16 fatcat:zvfhlod3zff3vnxefmff5zn42a

Liminal Learning: Understanding a Complex Adaptive Human Learning System through a Secondary School Internship Experience

Lisa Johnson Davis
2020 Figshare  
This research study examines one such experience of internship in a secondary school setting in which high school juniors are immersed in the work environment for four weeks as part of their academic requirements  ...  The experience of internship can provide much more than a career-related opportunity. Internship may be a window from which to observe how individuals cognitively navigate unknown social spaces.  ...  In a longitudinal study over six semesters of students participating in a Multimedia Design Degree program, Johari and Bradshaw (2008) reviewed the roles of task, learner, and mentor in instructional  ... 
doi:10.6084/m9.figshare.12444335.v2 fatcat:h5jgbdbjtrgxxcyj5hsocibi7a

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2019 Budget Estimates

Department Of Defense Comptroller's Office
2018 Zenodo  
Efforts focus on identified medical gaps in warfighter carerelated to health monitoring and preventing the spread of infectious disease.  ...  training and/or operations.  ...  -Demonstrate capabilities to maintain and expand situational awareness in the aftermath of a cyber-enabled attack on the power grid.  ... 
doi:10.5281/zenodo.1215599 fatcat:kxduvg6a5nflhf6iilkwnolobu

The Digital Challenge – On How We Live and Cope with Digital Dangers

Sven Bisquolm
An alternative design in combination with qualitative interviews or a longitudinal panel study could have delivered deeper insights in this regard.  ...  train stations.  ... 
doi:10.5167/uzh-197578 fatcat:msswtkybajggjf2qv2anj5ezui

Educational pathways to national cyber resilience: the Australian story [article]

Ana Stuparu, University, The Australian National
Finally, Israel is put forth as a case study for cyber education success, one from which Australia could learn.  ...  The gap this research focuses on is the lack of academic study in Australia across the area of cyber security education.  ...  I would go for an industry certification over a degree," These arguments place the spotlight on a window of opportunity for generating and strengthening national cyber resilience, one that is currently  ... 
doi:10.25911/5f90006bcbe3b fatcat:3p6p4qiqdbddzgxlztktigowjy


Pedro Mizukami, Oona Castro, Luiz Moncau, Ronaldo Lemos, Susana Abrantes, Olívia Bandeira, Thiago Camelo, Alex Dent, Joe Karaganis, Eduardo Magrani, Sabrina Pato, Marcelo Santos (+6 others)
High tariffs on imported goods and a narrow scope for patentable technologies were important elements of these strategies.  ...  Brazil acceded quickly to US demands in the first case, establishing copyright for software and removing import restrictions on computer equipment.  ...  Training, Awareness, and Education Combating piracy is more than a necessity; it's an ideology-[the belief] that we can take this country to another level.  ... 

NSUWorks Improved Detection for Advanced Polymorphic Malware Improved Detection for Advanced Polymorphic Malware

James Fraley, James Fraley, James Fraley
2017 unpublished
This study conducted a number of experiments using a standard experimental testing protocol.  ...  The study's approach was based on single case experimental design, a well-accepted protocol for progressive testing.  ...  Given the substantial growth and spotlight on ransomware attacks, developing protection and detection mechanisms should be a major research area for the security community.  ... 

Resilient Pedagogy: Practical Teaching Strategies to Overcome Distance, Disruption, and Distraction

Travis N. Thurston, Kacy Lundstrom, Chris González, Lindsay C. Masland, Beth Buyserie, Rachel Bryson, Rachel Quistberg, David S. Noffs, Kristina Wilson, James DeVaney, Jacob Fortman, Rebecca M. Quintana (+19 others)
Resilient Pedagogy offers a comprehensive collection on the topics and issues surrounding resilient pedagogy framed in the context of the COVID-19 pandemic and the social justice movements that have swept  ...  As a collection, Resilient Pedagogy is a multi-disciplinary and multi-perspective response to actions taken in different classrooms, across different institution types, and from individuals in different  ...  We present a training experience centered on designing courses that can adapt to multiple delivery modes.  ... 
doi:10.26079/a516-fb24 fatcat:izlc5f6bjnepliwhhcmjplmj3y

User Behavior Analysis on Social Web with Knowledge Discovery Techniques

Δέσποινα Δ. Χατζάκου
To cover a wide human emotional spectrum, basic emotions, social ones, and those that characterize general affective states are analyzed.  ...  Users express opinions on various topics, while also emotional responses are transferred with diverse intensity.  ...  A study was con- ducted in relation to their abusive behavior which showed that it is feasible to train a machine learning algorithm to detect bullies and aggressors on Twitter.  ... 
doi:10.26262/ fatcat:m5dqoztvh5b5pnmoigcboeblpu

Beyond the Privacy Calculus: Dynamics Behind Online Self-Disclosure

Amina Wagner
It assumes that self-disclosure (or, sometimes, usage) is a result of a rational privacy risk–benefit analysis.  ...  At the same time, firms rely on massive amounts of data divulged by their users to offer personalized services, perform data analytics, and pursue monetization.  ...  In this vein, longitudinal studies could offer further insights on users' complex and context-dependent self-disclosure decisions (Wagner et al. 2021 ).  ... 
doi:10.26083/tuprints-00019049 fatcat:6ailpgorl5dmpk5nbyorv3ve5a


Children of immigrants experience discrimination and stereotypes during their studies and professional training, becoming aware that others see them as being "different".  ...  He was one of the web activists targeted by the Tunisian authorities in the phishing operation. They managed to hack his Facebook account, but Salhi simply created a new account.  ... 
doi:10.13130/premazzi-viviana_phd2014-02-14 fatcat:7wykbl57svft5pspog5q3w4kbu
« Previous Showing results 1 — 15 out of 22 results