315,255 Hits in 5.3 sec

Consumerisation of IT: Mitigating Risky User Actions and Improving Productivity with Nudging

Iryna Yevseyeva, Charles Morisset, James Turland, Lynne Coventry, Thomas Groß, Christopher Laing, Aad van Moorsel
2014 Procedia Technology - Elsevier  
In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined  ...  with a strategy of influencing security behaviour by nudging.  ...  Government Communications Headquarters (GCHQ), UK, as a part of Cyber Research Institute.  ... 
doi:10.1016/j.protcy.2014.10.118 fatcat:le3uf7iuojabzhmezuh6ajjfje

Intent to purchase IoT home security devices: Fear vs privacy

Joey F. George, Rui Chen, Lingyao Yuan, Chun-Hsi Huang
2021 PLoS ONE  
However, they also understand that IoT home security devices may be a threat to the privacy of their personal information.  ...  IoT for consumers is often called the smart home market, and a large part of that market consists of home security devices.  ...  Fear is often used as a way to sell such devices, and we found that fear has a strong impact on consumer attitudes toward purchasing smart home security devices.  ... 
doi:10.1371/journal.pone.0257601 pmid:34547060 pmcid:PMC8454981 fatcat:wlrqazwy2vcadnzyxjgedwqe7e

Evaluation of the Attitudes towards Smartphone Apps When Using Smartphone within Jordanian Community

Ahmad Mashhour, Zakaria I. Saleh, Yaser Al-khateeb
2018 Indian Journal of Science and Technology  
The study found that Perceived Security and IT Expertise have a positive effect on Perceived Privacy, and that Attitude towards smartphone app and Perceived Usefulness shows significant effect on apps  ...  We also investigated user's awareness of the privacy and security threats when using smartphone applications.  ...  The question arises as to how much a person is protected from the illegal actions of collecting personal information while using such devices.  ... 
doi:10.17485/ijst/2018/v11i16/119070 fatcat:j363apzorfc65bhdivuypd5cbi

The adoption of byod or cope policies by a Brazilian company in the Petroleum industry

Marcos Luiz Lins Filho, Marcos Paulo Da Silva, Manoel Veras De Sousa Neto, Felipe Luiz Neves Bezerra de Melo, Carlos David Cequeira Feitor
2019 Exacta  
This study aims to assess the perception of employees of a large Brazilian company taking into account the use of personal mobile devices for professional purposes as well as their preference regarding  ...  The results show that the practice of bringing personal devices to the company raises the individual´s likelihood to prefer this model over the COPE model.  ...  With regards to the first question, we conclude that the habit of bringing a personal device to the workplace increases an individual's propensity towards adopting BYOD, which also increases preference  ... 
doi:10.5585/exactaep.v17n1.7844 fatcat:nnspbcfeo5do5b2sbku45ms2qq

BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD [article]

Andre Sobers
2015 arXiv   pre-print
Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities  ...  This paper proposes a mobile enterprise model that aims to address security concerns and the challenges of technology and policy change.  ...  There is the security risk that mobile applications on personal devices may cause a leak of internal data to the outside.  ... 
arXiv:1512.03911v1 fatcat:fy5vn6xlkra4nncgy6r4kctzyu

Offloading personal security applications to a secure and trusted network node

R. Bonafiglia, F. Ciaccia, A. Lioy, M. Nemirovsky, F. Risso, T. Su
2015 Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)  
INTRODUCTION Today's classical approach to the security of personal devices requires the installation of security software directly on the devices that need to be protected.  ...  In a nutshell, we propose to offload security to a personal Trusted Virtual Domain (TVD) running in an Network Edge Device (NED), in charge of executing all the user's security applications on the network  ... 
doi:10.1109/netsoft.2015.7116171 dblp:conf/netsoft/BonafigliaCLNRS15 fatcat:z55suzuoz5fsxkeq3h2vd35hr4

BYOD Technological: Next Generation Business Development Programs for Future Accelerations, Innovations and Employee Happiness

Mohammad Khaled
2017 International Journal of Computer Applications  
The research offers consequences about which factors have an impact on a personal devices use and employer appeal changes by the presenting of a BYOD service and when the impending employees are attentive  ...  Bring Your Own Device (BYOD) is a new leaning area the IT organization that has to deal with the costs, profits and risks.  ...  Though the usage of the personal devices are sensitive with the certain security issues attached with it.  ... 
doi:10.5120/ijca2017913929 fatcat:l7hbqrc56jbr7ljbybwevgdece

A Survey on Privacy and Security in Internet of Things

2017 International Journal of Innovations in Engineering and Technology  
Thus this paper presents a survey on privacy and security issues in Internet of Things.  ...  In the last few years, the world has witnessed major growth of everyday devices that are Internet-enabled, a concept commonly referred to as The Internet of Things.  ...  paper [12] security initiatives toward Internet of Things are : a) CRYPTOGRAPHY : This technique is implemented through some algorithms like AES , SHAI , MD5 and RSA etc.  ... 
doi:10.21172/ijiet.81.017 fatcat:q2p37o52hvd5hc5pmzqqa5llia

Modifying Security Policies Towards BYOD

U. Vignesh, S. Asha
2015 Procedia Computer Science  
The prevailing security policies in BYOD are no more supportive for mobile devices like smartphones, tablets and laptops. The security policies must be modified to suit these devices.  ...  In the IT Consumerization phase, the organizations permit their employees to bring their personally owned device to workplace.  ...  The BYOD security policies proposed is a multilevel security policy. Increase in the security should not reduce the security.  ... 
doi:10.1016/j.procs.2015.04.023 fatcat:w4kbhpwewrfixkhqjpq72oyupq

Legal Requirements towards Enhancing the Security of Medical Devices

Prosper K. Yeng, Stephen D., Bian Yang
2020 International Journal of Advanced Computer Science and Applications  
This study therefore conducted a stateof-the-art on security requirements, concerning medical devices in the US and EU.  ...  It is also difficult to hold device manufactures on negligence of duty especially after the device has been approved or if the harm on patient was as a result of a cyber attacker.  ...  ensure confidentiality of records and personal data of subjects; and 3) a description of measures to be adopted towards mitigating potential adverse impact in the event of data security breach. • Under  ... 
doi:10.14569/ijacsa.2020.0111181 fatcat:g43t52fibzfmdnxxcixr67zen4

Mobile health requires mobile security: challenges, solutions, and standardization

Peter Pharow, Bernd Blobel
2008 Studies in Health Technology and Informatics  
like sensors worn by a person or included in clothing.  ...  Extended communication and advanced cooperation in a permanently growing healthcare and welfare domain require a well-defined set of security services provided by an interoperable security infrastructure  ...  The society experiences a paradigm change from "Shared Care" towards "Personal Care" requiring advanced communication infrastructures [1] .  ... 
pmid:18487813 fatcat:jsen3pzujrbrjpv37sqyil22nu

Revealing Cyber Threat of Smart Mobile Devices within Digital Ecosystem: User Information Security Awareness [chapter]

Heru Susanto
2021 Data Integrity and Quality  
A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices.  ...  A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.  ...  Personal security.  ... 
doi:10.5772/intechopen.95752 fatcat:hev5xdzrkzemhcjvkusi6u2ajq

Personality Traits and Cognitive Determinants—An Empirical Investigation of the Use of Smartphone Security Measures

Jörg Uffen, Nico Kaemmerer, Michael H. Breitner
2013 Journal of Information Security  
In the last years, increasing smartphones' capabilities have caused a paradigm shift in the way of users' view and using mobile devices.  ...  The results suggest that multiple facets of smartphone user's personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures.  ...  Theoretical Background Key Areas Comprising Mobile Security Rapid changes in the use of mobile devices have caused a paradigm shift in the information security context.  ... 
doi:10.4236/jis.2013.44023 fatcat:ylkdb3w4cnfv3fxa7vz3fh53pq

Developing Countries Based End-User Computing Security Issues: Threats, Holes and Solution Prospects

Tibuhinda Ngonzi
2017 International Journal of Data Science and Analysis  
Security concerns comprise a prominent phenomenon in industrial computing.  ...  In that context, the main purpose of this paper is to espouse the security holes from the end-user dimension as a way of sensitizing for inclusive security thinking among IT experts.  ...  Also serious, is the second consequence which is a derivative of the loss of a personal computing device.  ... 
doi:10.11648/j.ijdsa.20170302.12 fatcat:mwpao6ricnfbtj3s4xyyqfo6tu

Online Expression, Personal Cybersecurity Costs, and the Specter of Cybercrime [chapter]

Juhani Rauhala, Pasi Tyrväinen, Nezer Zaidenberg
2020 Encyclopedia of Criminal Activities and the Deep Web  
In order to mitigate the security and privacy risks of the internet, some internet users spend valuable time thinking about and configuring the security settings of their devices.  ...  Latent factors are proposed for expression reluctance, attitude toward personal cybersecurity purchasing, and attitude toward time expenditure on cybersecurity.  ...  The inhibiting effect may also correlate with users' attitude toward and perception of the time they spend addressing their devices' security and privacy issues.  ... 
doi:10.4018/978-1-5225-9715-5.ch067 fatcat:fuoon7pnlbbjba6dvb6hfrfv4q
« Previous Showing results 1 — 15 out of 315,255 results