“Security begins at home”: Determinants of home computer and mobile device security behavior

N Thompson, TJ McGill, X Wang - computers & security, 2017 - Elsevier
Personal computing users are vulnerable to information security threats, as they must
independently make decisions about how to protect themselves, often with little …

The influence of hardiness and habit on security behaviour intention

QA Aigbefo, Y Blount, M Marrone - Behaviour & Information …, 2022 - Taylor & Francis
Small and medium-sized enterprises (SMEs) make up a large percentage of businesses;
they employ over 50% of all employees, and account for most partnerships in supply chain …

Your secrets are safe: How browsers' explanations impact misconceptions about private browsing mode

Y Wu, P Gupta, M Wei, Y Acar, S Fahl, B Ur - Proceedings of the 2018 …, 2018 - dl.acm.org
All major web browsers include a private browsing mode that does not store browsing
history, cookies, or temporary files across browsing sessions. Unfortunately, users have …

A quality-improvement optimization pilot of BariFit, a mobile health intervention to promote physical activity after bariatric surgery

P Klasnja, DE Rosenberg, J Zhou… - Translational …, 2021 - academic.oup.com
Bariatric surgery is the most effective treatment for severe obesity (body mass index> 40),
helping individuals lose, on average, 25%–29% of their body weight over the first year …

When information security depends on font size: how the saliency of warnings affects protection behavior

N Ebert, KA Ackermann, A Bearth - Journal of risk research, 2023 - Taylor & Francis
Prior research on how to improve the effectiveness of information security warnings has
predominantly focused on either the informational content of warnings or their visual …

An organizational communication approach to information security

K Arhin, GO Wiredu - The African Journal of …, 2018 - digitalcommons.kennesaw.edu
Organizations thrive on efficient information management systems as they support activities.
Hence, these systems need to be protected from attacks that threaten their existence and …

Using fMRI to measure stimulus generalization of software notification to security warnings

B Kirwan, B Anderson, D Eargle, J Jenkins… - Information Systems and …, 2020 - Springer
This paper examines how habituation to frequent software notifications may carry over to
infrequent security warnings. This general process—known as stimulus generalization or …

[PDF][PDF] " I used to live in Florida": Exploring the Impact of Spam Call Warning Accuracy on Callee Decision-Making

INS Munyaka, DA Delgado, JE Gilbert, J Ruiz… - ndss-symposium.org
Telephone carriers and third-party developers have created technical solutions to detect and
notify consumers of spam calls. The goal of this technology is to help users make decisions …

بررسی نقش میانجی سرسختی در ارتباط عادت با قصد رفتار امنیتی سایبری در معلمان تربیت بدنی خراسان جنوبی

چراغ بیرجندی, کاظم, حمیدی, شیخی ملاشاهی… - نوآوری در مدیریت …, 2023‎ - journals.srbiau.ac.ir
هدف از پژوهش حاضر، بررسی نقش میانجی سرسختی در ارتباط عادت با قصد رفتار امنیتی
سایبری در معلمان تربیت بدنی استان خراسان جنوبی بود. روش تحقیق از نوع توصیفی بود و به …

[PDF][PDF] Investigating the Mediating Role of Stubbornness in the Relationship between Habit and Intention of Cyber Security Behavior in Physical Education Teachers of …

KC Birjandi, F Hamidi, FS Molashahi… - Journal of Innovation …, 2023 - journals.srbiau.ac.ir
The aim of the present study was to investigate the mediating role of stubbornness in the
relationship between habit and intention of cyber security behavior in physical education …