Mobile security catching up? revealing the nuts and bolts of the security of mobile devices

M Becher, FC Freiling, J Hoffmann… - … IEEE Symposium on …, 2011 - ieeexplore.ieee.org
We are currently moving from the Internet society to a mobile society where more and more
access to information is done by previously dumb phones. For example, the number of …

The importance of conceptualising the human-centric approach in maintaining and promoting cybersecurity-hygiene in healthcare 4.0

K Kioskli, T Fotis, S Nifakos, H Mouratidis - Applied Sciences, 2023 - mdpi.com
The cyberspace depicts an increasing number of difficulties related to security, especially in
healthcare. This is evident from how vulnerable critical infrastructures are to cyberattacks …

An exploratory study of cyber hygiene behaviors and knowledge

AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …

Delegate the smartphone user? Security awareness in smartphone platforms

A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …

Improving interorganizational information sharing for vendor managed inventory: Toward a decentralized information hub using blockchain technology

T Guggenberger, A Schweizer… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Supply chain literature has long recognized the benefits of information sharing. Researchers
and practitioners see high potential for improving processes, enabling new replenishment …

Employees' behavior towards IS security policy compliance

S Pahnila, M Siponen… - 2007 40th Annual Hawaii …, 2007 - ieeexplore.ieee.org
The literature agrees that the major threat to IS security is constituted by careless employees
who do not comply with organizations' IS security policies and procedures. To address this …

A survey on smartphone user's security choices, awareness and education

F Breitinger, R Tully-Doyle, C Hassenfeldt - Computers & Security, 2020 - Elsevier
Smartphones contain a significant amount of personal data. Additionally, they are always in
the user's possession, which allows them to be abused for tracking (eg, GPS, Bluetooth or …

Power to the people? The evolving recognition of human aspects of security

S Furnell, N Clarke - computers & security, 2012 - Elsevier
It is perhaps unsurprising to find much of the focus in IT and computer security being drawn
towards the technical aspects of the discipline. However, it is increasingly recognised that …

Why doesn't Jane protect her privacy?

K Renaud, M Volkamer… - … Symposium, PETS 2014 …, 2014 - Springer
End-to-end encryption has been heralded by privacy and security researchers as an
effective defence against dragnet surveillance, but there is no evidence of widespread end …

When enough is enough: Investigating the antecedents and consequences of information security fatigue

WA Cram, JG Proudfoot, J D'Arcy - Information Systems Journal, 2021 - Wiley Online Library
Despite concerns raised by practitioners, the potential downside of the information security
demands imposed by organizations on their employees has received limited scholarly …