Dimensions of Internet Use and Threat Sensitivity: An Exploratory Study among Students of Higher Education
暂无分享,去创建一个
Jouni Isoaho | Seppo Virtanen | Lalitha Balakrishnan | Muneeroh Phadung | Ali Farooq | Johanna Isoaho | Dhan Prasad Poudel | S. Virtanen | J. Isoaho | Ali Farooq | Muneeroh Phadung | Johanna Isoaho | L. Balakrishnan
[1] Grant Blank,et al. Dimensions of Internet use: amount, variety, and types , 2014 .
[2] Alexander van Deursen,et al. The digital divide shifts to differences in usage , 2014, New Media Soc..
[3] Won Kim,et al. The dark side of the Internet: Attacks, costs and responses , 2011, Inf. Syst..
[4] Paul DiMaggio,et al. From the 'Digital Divide' to 'Digital Inequality': Studying Internet Use as Penetration Increases , 2001 .
[5] P. Howard,et al. Days and Nights on the Internet , 2001 .
[6] Elmarie Kritzinger,et al. Cyber security for home users: A new way of protection through awareness enforcement , 2010, Comput. Secur..
[7] RICHAFID BASKERVILLE,et al. Information systems security design methods: implications for information systems development , 1993, CSUR.
[8] Jouni Isoaho,et al. A taxonomy of perceived information security and privacy threats among IT security students , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[9] E. Hargittai,et al. Digital Inequality , 2008, Commun. Res..
[10] John Holmes,et al. Cyberkids or divided generations? Characterising young people’s internet use in the UK with generic, continuum or typological models , 2011, New Media Soc..
[11] Steven Furnell. Remote PC Security: Securing the home worker , 2006 .
[12] Scott Mensch,et al. Information Security Activities of College Students: An Exploratory Study , 2011 .
[13] Adam N. Joinson,et al. Privacy, Trust, and Self-Disclosure Online , 2010, Hum. Comput. Interact..
[14] Eyong B. Kim,et al. Recommendations for information security awareness training for college students , 2014, Inf. Manag. Comput. Secur..
[15] Yaobin Lu,et al. Internet inequality: The relationship between high school students' Internet use in different locations and their Internet self-efficacy , 2010, Comput. Educ..
[16] E. Helsper,et al. The Third-Level Digital Divide: Who Benefits Most from Being Online? , 2015 .
[17] Ali Farooq,et al. Information Security Awareness: Comparing perceptions and training preferences , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[18] Petter Bae Brandtzæg,et al. Towards a unified Media-User Typology (MUT): A meta-analysis and review of the research literature on media-user typologies , 2010, Comput. Hum. Behav..
[19] Latifa Ben Arfa Rabai,et al. Classification of Security Threats in Information Systems , 2014, ANT/SEIT.
[20] Eyong B. Kim. Information Security Awareness Status of Business College: Undergraduate Students , 2013, Inf. Secur. J. A Glob. Perspect..
[21] Amela Karahasanovic,et al. Understanding the new digital divide - A typology of Internet users in Europe , 2011, Int. J. Hum. Comput. Stud..
[22] Yacine Rezgui,et al. Information security awareness in higher education: An exploratory study , 2008, Comput. Secur..
[23] Mo Adam Mahmood,et al. Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[24] Robert LaRose,et al. Internet Self-Efficacy and the Psychology of the Digital Divide , 2006, J. Comput. Mediat. Commun..