Internet of Things (IoT) Privacy and Security: A User-Focused Study of Aotearoa New Zealand Home Users
暂无分享,去创建一个
Bryan Ng | Ian Welch | Sue Chard | Lisa Patterson | I. Welch | S. Chard | Bryan K. F. Ng | Lisa Patterson
[1] L. Hadlington. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours , 2017, Heliyon.
[2] Víctor Juan Expósito Jiménez,et al. An overview of wireless IoT protocol security in the smart home domain , 2017, 2017 Internet of Things Business Models, Users, and Networks.
[3] Mariana Cains,et al. Trust as a Human Factor in Holistic Cyber Security Risk Assessment , 2015 .
[4] John A Hughes,et al. Sociological Analysis: Methods of Discovery , 1976 .
[5] Mohamed E. Seliaman,et al. The Impact of Privacy Concerns and Perceived Vulnerability to Risks on Users Privacy Protection Behaviors on SNS: A Structural Equation Model , 2016 .
[6] John W. Creswell,et al. A Concise Introduction to Mixed Methods Research , 2014 .
[7] Gretchen Rossman,et al. Learning in the Field: An Introduction to Qualitative Research , 1998 .
[8] Donald H. Rumsfeld. Known and Unknown: A Memoir , 2011 .
[9] Michael E. Lesk,et al. Privacy and Cybersecurity: The Next 100 Years , 2012, Proceedings of the IEEE.
[10] Mizuho Iwaihara,et al. Associations between privacy, risk awareness, and interactive motivations of social networking service users, and motivation prediction from observable features , 2015, Comput. Hum. Behav..
[11] Maximilian von Grafenstein,et al. Privacy and Security in Autonomous Vehicles , 2017 .
[12] J. Friedrich,et al. Security Engineering: a Guide to Building Dependable Distributed Systems Banking and Bookkeeping , 2022 .
[13] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[14] Blake Ives,et al. Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effectiveness in Basic It Skills Training Author(s): Piccoli Et Al./web-based Virtual Learning Environments Web-based Virtual Learning Environments: a Research Framework and a Preliminary Assessment of Effe , 2022 .
[15] Ahmad-Reza Sadeghi,et al. Internet of things or threats?: on building trust in IoT (keynote) , 2018, CODES+ISSS.
[16] Tejaswini Herath,et al. Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..
[17] A. Bandura. Self-Efficacy: The Exercise of Control , 1997, Journal of Cognitive Psychotherapy.
[18] Inho Choi,et al. Parental Mediation Regarding Children's Smartphone Use: Role of Protection Motivation and Parenting Style , 2017, Cyberpsychology Behav. Soc. Netw..
[19] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[20] Araz Taeihagh,et al. Autonomous Vehicles for Smart and Sustainable Cities: An In-Depth Exploration of Privacy and Cybersecurity Implications , 2018, ArXiv.
[21] A. Edmondson,et al. METHODOLOGICAL FIT IN MANAGEMENT FIELD RESEARCH. , 2007 .
[22] Yair Levy,et al. The role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills influence on computer misuse , 2013 .
[23] R. W. Rogers,et al. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change , 1983 .
[24] Teodor Sommestad,et al. A Meta-Analysis of Studies on Protection Motivation Theory and Information Security Behaviour , 2015, Int. J. Inf. Secur. Priv..
[25] George A. Akerlof,et al. The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .
[26] Marc Dupuis,et al. Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices , 2018, SIGITE.