Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users
暂无分享,去创建一个
Krishnun Sansurooah | David M Cook | Patryck Szewczyk | Krishnun Sansurooah | David M Cook | Patryck Szewczyk
[1] Steven Furnell,et al. Who guides the little guy? Exploring security advice and guidance from retailers and ISPs , 2008 .
[2] Mark Ciampa. Security Awareness: Applying Practical Security in Your World , 2004 .
[3] Giuseppe Riva,et al. The Mind Over the Web: The Quest for the Definition of a Method for Internet Research , 2001, Cyberpsychology Behav. Soc. Netw..
[4] Sri Hastuti Kurniawan,et al. Increasing the Usability of Online Information for Older Users: A Case Study in Participatory Design , 2000, Int. J. Hum. Comput. Interact..
[5] Donna Weaver McCloskey,et al. The Importance of Ease of Use, Usefulness, and Trust to Online Consumers: An Examination of the Technology Acceptance Model with Older Customers , 2006, J. Organ. End User Comput..
[6] Craig Valli,et al. Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective , 2009 .
[7] Russell Napier. Get Safe Online , 2005 .
[8] Alan F. Newell,et al. Introducing the Internet to the over-60s: Developing an email system for older novice computer users , 2005, Interact. Comput..
[9] Mirka Koro-Ljungberg. Validity and Validation in the Making in the Context of Qualitative Research , 2008, Qualitative health research.
[10] Patryk Szewczyk,et al. Assessing the Online Security Awareness of Australian Internet Users , 2009 .
[11] O. Mitchell,et al. Baby Boomer Retirement Security: The Roles of Planning, Financial Literacy, and Housing Wealth , 2006 .
[12] George Whitson. Security for service oriented architectures , 2008 .
[13] Ronald C. Dodge,et al. Phishing for user security awareness , 2007, Comput. Secur..
[14] Albert L. Harris,et al. The impact of information richness on information security awareness training effectiveness , 2009, Comput. Educ..
[15] D. Davies,et al. Qualitative Research and the Question of Rigor , 2002, Qualitative health research.
[16] Charles P. Pfleeger,et al. Security in computing , 1988 .