A call for research on home users' information security behaviour

被引:0
作者
Department of Information Processing Science, University of Oulu, Oulu, Finland [1 ]
机构
来源
PACIS - Pac. Asia Conf. Inf. Syst.: Qual. Res. Pac. |
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
15th Pacific Asia Conference on Information Systems: Quality Research in Pacific, PACIS 2011
中图分类号
学科分类号
摘要
Behavioral research - Security of data - Information systems - Personal computers - Information use
引用
收藏
相关论文
共 50 条
  • [21] An approach to risks in cyber physical systems based on information security psychology
    Fukuzawa, Yasuko
    Samejima, Masaki
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (06) : 756 - 759
  • [22] Data Encryption by AES: Security Guarantee for Network Communication Sensitive Information
    Shan, Jizhou
    Ma, Hong
    International Journal of Network Security, 2023, 25 (06) : 1064 - 1069
  • [23] The Application and Practice of Computer Network Security Technology in Electronic Information Engineering
    Guilin University of Electronic Science and Technology, Guangxi, Guilin
    541000, China
    ACM Int. Conf. Proc. Ser., 1600, (73-77):
  • [24] Research on file synchronization backup system based on security policy
    Software College, Northeastern University, Shenyang, China
    不详
    IEEE Int. Conf. Commun. Softw. Networks, ICCSN, 2011, (246-249):
  • [25] Research on security routing protocol based on geography and energy aware
    Wang, Yong-Jian
    Yang, Jun-Zuo
    Man, Da-Peng
    Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 142 - 147
  • [26] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [27] New Paradigm of Geographic Information Systems Research
    Hua, Yixin
    Zhao, Xinke
    Zhang, Jiangshui
    Journal of Geo-Information Science, 2023, 25 (01): : 15 - 24
  • [28] A method for quantifying information security incident costs in a Japanese national university corporation
    Nagai, Yoshikazu
    Ichikawa, Yoshihiko
    Hasegawa, Takahiro
    Itou, Ken
    Miike, Hidetoshi
    Tadamura, Katsumi
    WMSCI 2009 - The 13th World Multi-Conference on Systemics, Cybernetics and Informatics, Jointly with the 15th International Conference on Information Systems Analysis and Synthesis, ISAS 2009 - Proc., 2009, 2 : 117 - 122
  • [29] Ethical AI Research Untangled: Mapping Interdisciplinary Perspectives for Information Systems Research
    Kahdan, Manoj
    Hartwich, Nicole
    Salge, Torsten-Oliver
    International Conference on Information Systems, ICIS 2022: Digitization for the Next Generation, 2022,
  • [30] Research on Improved Security Enhancement Technology Algorithm of Beidou Navigation System
    Zhang, Peng
    Zhao, Lili
    Tan, Zhihao
    Si, Yan
    Wang, Lina
    Proceedings - 2023 9th Annual International Conference on Network and Information Systems for Computers, ICNISC 2023, 2023, : 620 - 622