• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4632662)   Today's Articles (2408)   Subscriber (49915)
For: Mamonov S, Benbunan-Fich R. The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior 2018. [DOI: 10.1016/j.chb.2018.01.028] [Citation(s) in RCA: 51] [Impact Index Per Article: 8.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
Number Cited by Other Article(s)
1
Alwafi G, Fakieh B. A machine learning model to predict privacy fatigued users from social media personalized advertisements. Sci Rep 2024;14:3685. [PMID: 38355815 PMCID: PMC10867113 DOI: 10.1038/s41598-024-54078-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/08/2023] [Accepted: 02/08/2024] [Indexed: 02/16/2024]  Open
2
Jafri JA, Mohd Amin SI, Abdul Rahman A, Mohd Nor S. A systematic literature review of the role of trust and security on Fintech adoption in banking. Heliyon 2024;10:e22980. [PMID: 38163181 PMCID: PMC10756967 DOI: 10.1016/j.heliyon.2023.e22980] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/08/2023] [Revised: 11/21/2023] [Accepted: 11/23/2023] [Indexed: 01/03/2024]  Open
3
Jiang R, Zhang J. The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. Comput Secur 2023;130:103253. [PMID: 37091524 PMCID: PMC10079594 DOI: 10.1016/j.cose.2023.103253] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/05/2022] [Revised: 02/23/2023] [Accepted: 04/05/2023] [Indexed: 04/25/2023]
4
Iqbal J, Soroya SH, Mahmood K. Financial information security behavior in online banking. INFORMATION DEVELOPMENT 2023. [DOI: 10.1177/02666669221149346] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/07/2023]
5
Gao W, Wang H, Jiang N. The Impact of Data Vulnerability in Online Health Communities: An Institutional Assurance Perspective. Front Psychol 2022;13:908309. [PMID: 35846612 PMCID: PMC9277555 DOI: 10.3389/fpsyg.2022.908309] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/30/2022] [Accepted: 06/06/2022] [Indexed: 11/13/2022]  Open
6
Zhang D, Lim J, Zhou L, Dahl AA. Breaking the Data Value-Privacy Paradox in Mobile Mental Health Systems Through User-Centered Privacy Protection: A Web-Based Survey Study. JMIR Ment Health 2021;8:e31633. [PMID: 34951604 PMCID: PMC8742208 DOI: 10.2196/31633] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 06/28/2021] [Revised: 08/06/2021] [Accepted: 10/15/2021] [Indexed: 11/21/2022]  Open
7
The Impact of Organizational Practices on the Information Security Management Performance. INFORMATION 2021. [DOI: 10.3390/info12100398] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
8
Ioannou A, Tussyadiah I, Miller G, Li S, Weick M. Privacy nudges for disclosure of personal information: A systematic literature review and meta-analysis. PLoS One 2021;16:e0256822. [PMID: 34449821 PMCID: PMC8396794 DOI: 10.1371/journal.pone.0256822] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/26/2021] [Accepted: 08/16/2021] [Indexed: 11/26/2022]  Open
9
Venkatesh V, Hoehle H, Aloysius JA, Nikkhah HR. Being at the cutting edge of online shopping: Role of recommendations and discounts on privacy perceptions. COMPUTERS IN HUMAN BEHAVIOR 2021. [DOI: 10.1016/j.chb.2021.106785] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
10
McGill T, Thompson N. Exploring potential gender differences in information security and privacy. INFORMATION AND COMPUTER SECURITY 2021. [DOI: 10.1108/ics-07-2020-0125] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
van der Schyff K, Flowerday S. Mediating effects of information security awareness. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102313] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
12
Erdoğdu F, Gökoğlu S, Kara M. “What about users?”: Development and validation of the mobile information security awareness scale (MISAS). ONLINE INFORMATION REVIEW 2020. [DOI: 10.1108/oir-04-2020-0129] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
van der Schyff K, Flowerday S, Furnell S. Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101866] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/06/2023]
14
Personal Information Disclosure via Voice Assistants: The Personalization–Privacy Paradox. ACTA ACUST UNITED AC 2020. [DOI: 10.1007/s42979-020-00287-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
15
van der Schyff K, Flowerday S, Lowry PB. Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment. Heliyon 2020;6:e04714. [PMID: 32904276 PMCID: PMC7452521 DOI: 10.1016/j.heliyon.2020.e04714] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/13/2020] [Revised: 08/06/2020] [Accepted: 08/10/2020] [Indexed: 12/03/2022]  Open
16
Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2020. [DOI: 10.1016/j.ijinfomgt.2019.102056] [Citation(s) in RCA: 28] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
17
Ameen N, Tarhini A, Hussain Shah M, Madichie NO. Employees’ behavioural intention to smartphone security: A gender-based, cross-national study. COMPUTERS IN HUMAN BEHAVIOR 2020. [DOI: 10.1016/j.chb.2019.106184] [Citation(s) in RCA: 20] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
18
Luciano E, Mahmood MA, Mansouri Rad P. Telemedicine adoption issues in the United States and Brazil: Perception of healthcare professionals. Health Informatics J 2020;26:2344-2361. [PMID: 32072843 DOI: 10.1177/1460458220902957] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
19
Insight into hackers’ reaction toward information security breach. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2019. [DOI: 10.1016/j.ijinfomgt.2019.07.010] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
20
Sahmim S, Gharsellaoui H, Bouamama S. Edge Computing: Smart Identity Wallet Based Architecture and User Centric. ACTA ACUST UNITED AC 2019. [DOI: 10.1016/j.procs.2019.09.294] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA