Linked e-resources

Details

Usable Security
Authentication Management of Home IoT Devices
Emics and Etics of Usable Security: Culturally Specific or Culturally Universal?
Development of a Novice-Friendly Representation of Camouflaged Boolean Networks
Testing Facial Recognition Software for Young Adults and Adolescents: An Integrative Review
Eye Gaze and Interaction Differences of Holistic versus Analytic Users in Image-recognition Human Interaction Proof Schemes
Risk Assessment of "Ostrich ZIP"
Identity Recognition based on the Hierarchical Behavior Characteristics of Network Users
Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services
Security and Privacy by Design
Beyond Murphy's Law: Applying wider Human Factors Behavioural Science Approaches in Cyber-Security Resilience
A Human Factor Approach to Threat Modeling
Smart Technologies and Internet of Things Designed for Aging in Place
Please Stop Listening while I Make a Private Call: Context-Aware In-Vehicle Mode of a Voice-Controlled Intelligent Personal Assistant with a Privacy Consideration
Enterprise Data Sharing Requirements: Rich Policy Languages and Intuitive User Interfaces
Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk
Human Individual Difference Predictors in Cyber Security: Exploring an Alternative Scale Method and Data Resolution to Modelling Cyber Secure Behavior
Privacy Design Strategies and the GDPR: A Systematic Literature Review
User Behavior Analysis in Cybersecurity
'Just-in-Time' Parenting: A Two-Month Examination of the Bi-directional Influences between Parental Mediation and Adolescent Online Risk Exposure
Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices
Perceptions of Security and Privacy in mHealth
Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account
CyberPin
Challenges on Recognizing Youngest Cyber Talents
It's Not My Problem: How Healthcare Models relate to SME Cybersecurity Awareness
Understanding the Last Line of Defense: Human Response to Cybersecurity Events
Security and Privacy Awareness
The Effectiveness of Video Messaging Campaigns to Use 2FA
A Study on Online Businesses' Commitment to Consumer Privacy
Help the User Recognize a Phishing Scam: Design of Explanation Messages in Warning Interfaces for Phishing Attacks
Social Engineering Attacks: Recent Advances and Challenges
Brand Validation: Security Indicator to Better Indicate Website Identity
Study on the Impact of Learning about Information Security Measures on Mental Models: Applying Cybersecurity Frameworks to Self-learning Materials
Gaming Apps' and Social Media Partnership: A Privacy Perspective.

Browse Subjects

Show more subjects...

Statistics

from
to
Export