Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

The least secure places in the universe? A systematic literature review on information security management in higher education

I Bongiovanni - Computers & Security, 2019 - Elsevier
Current research has demonstrated the progressively more strategic role that information
security has in modern organisations. Higher education is no exception. The reported …

Evaluating the sustainable use of mobile payment contactless technologies within and beyond the COVID-19 pandemic using a hybrid SEM-ANN approach

MA Al-Sharafi, N Al-Qaysi, NA Iahad… - International Journal of …, 2022 - emerald.com
Purpose While there is an abundant amount of literature studies on mobile payment
adoption, there is a scarce of knowledge concerning the sustainable use of mobile payment …

A customer-centric view of E-commerce security and privacy

S Saeed - Applied Sciences, 2023 - mdpi.com
Business organizations have huge potential to increase their customer base by offering e-
commerce services, especially in the post-pandemic era. Ensuring secure e-commerce …

Understanding online safety behaviors: A protection motivation theory perspective

HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon… - Computers & …, 2016 - Elsevier
Internet users experience a variety of online security threats that require them to enact safety
precautions. Protection motivation theory (PMT) provides a theoretical framework for …

Keeping customers' data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce

N Ameen, A Tarhini, MH Shah, N Madichie… - Computers in Human …, 2021 - Elsevier
Employees are increasingly relying on mobile devices. In international organizations, more
employees are using their personal smartphones for work purposes. Meanwhile, the number …

Towards a wearable education: Understanding the determinants affecting students' adoption of wearable technologies using machine learning algorithms

M Al-Emran, MN Al-Nuaimi, I Arpaci… - Education and …, 2023 - Springer
The emergence of wearable technologies, including smartwatches, has received a
considerable attention from scholars across several sectors. However, there is a scarcity of …

“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

A test of protection motivation theory in the information security literature: A meta-analytic structural equation modeling approach

J Mou, JF Cohen, A Bhattacherjee… - Journal of the Association …, 2022 - aisel.aisnet.org
Abstract Information security is one of the important domains of information systems
research today, with protection motivation theory (PMT) one of its most influential theoretical …

What we think we know about cybersecurity: an investigation of the relationship between perceived knowledge, internet trust, and protection motivation in a cybercrime …

L De Kimpe, M Walrave, P Verdegem… - Behaviour & …, 2022 - Taylor & Francis
Individual internet users are commonly considered the weakest links in the cybersecurity
chain. One reason for this is that they tend to be overoptimistic regarding their own online …