Over the past few years, there has been an exponential increase in the percentage of people owning and using a smart phone. These devices have sensor-rich touchscreens that …
Intentional insider misuse of information systems resources (ie, IS misuse) represents a significant threat to organizations. For example, industry statistics suggest that between 50 …
L O'Gorman - Proceedings of the IEEE, 2003 - ieeexplore.ieee.org
For decades, the password has been the standard means for user authentication on computers. However, as users are required to remember more, longer, and changing …
I Arend, A Shabtai, T Idan, R Keinan… - Computers & Security, 2020 - Elsevier
Vulnerabilities to online cyber-related crime are typically the result of poor decisions on the part of users. To date, research on risk-taking behavior applied to cyber-security situations …
T Schlienger, S Teufel - Security in the information society: Visions and …, 2002 - Springer
The information security management mostly disregards the human dimension. The main focus is on technical and procedural measures. The user is seen as a security enemy, not as …
Both researchers and practitioners are only in the early stages of examining and understanding the application of artificial intelligence (AI) in terms of marketing themselves …
MH Shah, HR Peikari, NM Yasin - International Journal of Information …, 2014 - Elsevier
Despite the critical role of individuals' perceived security in an online environment, previous research has not attempted to comprehensively study the influences and interrelations …
PA Thomas, K Preetha Mathew - Journal of Ambient Intelligence and …, 2023 - Springer
Authentication is the process of keeping the user's personal information as confidential in digital applications. Moreover, the user authentication process in the digital platform is …
Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) …