Between privacy and security: the factors that drive intentions to use cyber-security applications
暂无分享,去创建一个
[1] Spyros Kokolakis,et al. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..
[2] Edith G. Smit,et al. The privacy trade-off for mobile app downloads: The roles of app value, intrusiveness, and privacy concerns , 2018, Decis. Support Syst..
[3] Wenjing Xie,et al. Revealing the relationship between rational fatalism and the online privacy paradox , 2018, Behav. Inf. Technol..
[4] Ninghui Li,et al. Influence of Risk/Safety Information Framing on Android App-Installation Decisions , 2015 .
[5] Jorge Cadima,et al. Principal component analysis: a review and recent developments , 2016, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[6] Akira Yamada,et al. Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior , 2017, CHI.
[7] Claudio Bettini,et al. The Privacy Implications of Cyber Security Systems , 2018, ACM Comput. Surv..
[8] Adam J. Aviv,et al. An empirical study examining the perceptions and behaviours of security-conscious users of mobile authentication , 2018, Behav. Inf. Technol..
[9] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[10] I. Ajzen. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior. , 2002 .
[11] H. Kaiser. The Application of Electronic Computers to Factor Analysis , 1960 .
[12] I. Ajzen. The theory of planned behavior , 1991 .
[13] Sven Jöckel,et al. Processing privacy information and decision-making for smartphone apps among young German smartphone users , 2018, Behav. Inf. Technol..
[14] Joey F. George,et al. The theory of planned behavior and Internet purchasing , 2004, Internet Res..
[15] Anurag Kumar Jain,et al. Addressing Security and Privacy Risks in Mobile Applications , 2012, IT Professional.
[16] Colin Potts,et al. Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..
[17] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[18] Corrado Moiso,et al. Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure , 2017, ACM Trans. Internet Techn..
[19] Jesse J. Chandler,et al. Inside the Turk , 2014 .
[20] KokolakisSpyros. Privacy attitudes and privacy behaviour , 2017 .
[21] E. Ramsey,et al. Trust considerations on attitudes towards online purchasing: The moderating effect of privacy and security concerns , 2010 .
[22] Murat Koyuncu,et al. Security Awareness Level of Smartphone Users: An Exploratory Case Study , 2019, Mob. Inf. Syst..
[23] Ninghui Li,et al. Influence of privacy priming and security framing on mobile app selection , 2018, Comput. Secur..
[24] Steven Furnell,et al. Awareness of Mobile Device Security: A Survey of User's Attitudes , 2016, Int. J. Mob. Comput. Multim. Commun..
[25] Gaurav Bansal,et al. Distinguishing between Privacy and Security Concerns: An Empirical Examination and Scale Validation , 2017, J. Comput. Inf. Syst..
[26] Ming-Chuen Chuang,et al. The Kano model analysis of features for mobile security applications , 2018, Comput. Secur..
[27] Brajendra Panda,et al. Evaluating damage from cyber attacks: a model and analysis , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[28] Henry E. Newkirk,et al. An Empirical Investigation of Factors that Influence Individual Behavior toward Changing Social Networking Security Settings , 2016, J. Theor. Appl. Electron. Commer. Res..
[29] Carlos Flavián,et al. The role of security, privacy, usability and reputation in the development of online banking , 2007, Online Inf. Rev..