Showing 1 - 10 of 24
Purpose Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses risks to businesses, government agencies and all users due to sensitive data breaches and subsequent financial losses. To study the user side, this paper aims to conduct a literature review...
Persistent link: https://www.econbiz.de/10014754925
Purpose – The Android pattern lock screen (or graphical password) is a popular user authentication method that relies … survey to study the users’ understanding of the security and usability of the pattern lock screen. The authors developed an … Android application that collects graphical passwords, by simulating user authentication in a mobile device. This avoids any …
Persistent link: https://www.econbiz.de/10014754612
and application of promising authentication features. Text passwords persist despite several decades of evidence of their … security and usability challenges. It seems extremely unlikely that a single scheme will globally replace text passwords …, suggesting that a diverse ecosystem of multiple authentication schemes designed for specific environments is needed …
Persistent link: https://www.econbiz.de/10014754805
information and communication technology (ICT) safety and security within network companies in the electric power supply sector …, implementation of awareness creation and training measures for ICT safety and security within these companies and the relationship … and security conferences. Findings – In accordance with previous research, our survey data showed a statistically …
Persistent link: https://www.econbiz.de/10014754654
focus on security and privacy issues. Design/methodology/approach This study was conducted for the identification of factors … responsible for the adoption of the AI-integrated CRM system in Indian organizations focusing attention on security and privacy … studied with a focus on security and privacy issues. After the initial study, few hypotheses have been formulated and a …
Persistent link: https://www.econbiz.de/10014754663
protection. This study aims to explore the factors that influence users’ to adopt security behaviour. Design …/methodology/approach A synthesis of theories – Self-efficacy and technology threat avoidance theories – was used to examine the security … implications Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the …
Persistent link: https://www.econbiz.de/10014754666
Purpose – This study aims to examine the influence of one or more information security breaches on an organisation … studies-based approach was used where a measure of the event’s economic impact can be constructed using security prices …, especially for recurring security breaches. Research limitations/implications – One of the main limitations of this study was the …
Persistent link: https://www.econbiz.de/10014754675
) security and investigate the degree of impact of these components on MCC security as a whole. Design … the interactions. Findings The eight components of MCC security in the order of importance are as follows: mobile device … related, user identity related, deployment model related, application-level security issues, data related, virtualization …
Persistent link: https://www.econbiz.de/10014754700
Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of … – The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures … and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users …
Persistent link: https://www.econbiz.de/10014754706
Purpose The purpose of this study is to identify factors that determine computer and security expertise in end users …. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized …, externally valid instruments for measuring end-user security expertise are non-existent. Design/methodology/approach A …
Persistent link: https://www.econbiz.de/10014754712