A call for research on home users' information security behaviour

被引:0
作者
Department of Information Processing Science, University of Oulu, Oulu, Finland [1 ]
机构
来源
PACIS - Pac. Asia Conf. Inf. Syst.: Qual. Res. Pac. |
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
15th Pacific Asia Conference on Information Systems: Quality Research in Pacific, PACIS 2011
中图分类号
学科分类号
摘要
Behavioral research - Security of data - Information systems - Personal computers - Information use
引用
收藏
相关论文
共 50 条
[21]   13th International Conference on Applications and Techniques in Information Security, ATIS 2022 [J].
Communications in Computer and Information Science, 2023, 1804 CCIS
[22]   SAFECAST Project: European research on seismic behaviour of the connections of precast structures [J].
Toniolo, Giandomenico M. .
ECCOMAS Thematic Conference - COMPDYN 2013: 4th International Conference on Computational Methods in Structural Dynamics and Earthquake Engineering, Proceedings - An IACM Special Interest Conference, 2013, :1482-1493
[23]   The Mediating Role of Information Sharing in the Effect of Blockchain Strategy Information Security on E-Supply Chain in the UAE Real Estate Industry [J].
Hamadneh, Samer ;
Alzoubi, Haitham M. ;
Alquqa, Enass Khalil ;
Al Shraah, Ata ;
Alshurideh, Muhammad Turki ;
Al Kurdi, Barween .
Studies in Big Data, 2024, 117 :387-407
[24]   Research on security evaluation mechanism of in-vehicle controller area network bus [J].
Zhang, Haichun ;
Jiang, Rongshuai ;
Lu, Zhaojun ;
Liu, Zhenglin .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2022, 50 (01) :1-6
[25]   Research on the Construction of Network Security Attack Detection Model Based on Knowledge Graph [J].
Qin, Lina .
2024 IEEE 4th International Conference on Electronic Technology, Communication and Information, ICETCI 2024, 2024, :596-603
[26]   Simulation research and design of user behavior prediction for smart home Internet of Things [J].
Shi, Jinmei ;
Zhao, Qingcheng ;
Zhou, Ailing ;
Ye, Peng .
ACM International Conference Proceeding Series, 2023, :1217-1221
[27]   Research and design of logistic information system based on GIS technology [J].
Haibo, Chengyu Shen .
2010 2nd International Conference on E-Business and Information System Security, EBISS2010, 2010, :611-614
[28]   28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022 [J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13792 LNCS
[29]   Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions [J].
Akter, Mst Shapna ;
Rodriguez-Cardenas, Juanjose ;
Shahriar, Hossain ;
Cuzzocrea, Alfredo ;
Wu, Fan .
Proceedings - 2023 IEEE International Conference on Big Data, BigData 2023, 2023, :5408-5417
[30]   Information Systems Security Countermeasures: An Assessment of Older Workers in Indonesian Small and Medium-Sized Businesses [J].
Roosman, Hari Samudra .
ProQuest Dissertations and Theses Global, 2022,