Why people replace their aging smart devices: A push–pull–mooring perspective (English)
- New search for: Lenz, Julia
- New search for: Bozakov, Zdravko
- Further information on Bozakov, Zdravko:
- https://orcid.org/0000-0001-6135-3625
- New search for: Wendzel, Steffen
- Further information on Wendzel, Steffen:
- https://orcid.org/0000-0002-1913-5912
- New search for: Vrhovec, Simon
- Further information on Vrhovec, Simon:
- https://orcid.org/0000-0002-6951-6369
- New search for: Lenz, Julia
- New search for: Bozakov, Zdravko
- New search for: Wendzel, Steffen
- New search for: Vrhovec, Simon
In:
Computers and Security
;
130
;
2023
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Why people replace their aging smart devices: A push–pull–mooring perspective
-
Contributors:Lenz, Julia ( author ) / Bozakov, Zdravko ( author ) / Wendzel, Steffen ( author ) / Vrhovec, Simon ( author )
-
Published in:Computers and Security ; 130
-
Publisher:
- New search for: The Author(s)
-
Publication date:2023-04-09
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 130
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workersNwankpa, Joseph K. / Datta, Pratim Milton et al. | 2023
-
A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss FunctionGupta, Prajjwal / Yadav, Krishna / Gupta, Brij B. / Alazab, Mamoun / Gadekallu, Thippa Reddy et al. | 2023
-
Edge intelligence secure frameworks: Current state and future challengesVillar-Rodriguez, Esther / Pérez, María Arostegi / Torre-Bastida, Ana I. / Senderos, Cristina Regueiro / López-de-Armentia, Juan et al. | 2023
-
Combining raw data and engineered features for optimizing encrypted and compressed internet of things traffic classificationSaleh, Mariam M. / AlSlaiman, Muhanned / Salman, Mohammed I. / Wang, Bin et al. | 2023
-
Locally differentially private multi-dimensional data collection via haar transformZhang, Dongyue / Ni, Weiwei / Fu, Nan / Hou, Lihe / Zhang, Ruyu et al. | 2023
-
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphsFan, Yuanhai / Wan, Chuanhao / Fu, Cai / Han, Lansheng / Xu, Hao et al. | 2023
-
CROSS: A framework for cyber risk optimisation in smart homesZhang, Yunxiao / Malacaria, Pasquale / Loukas, George / Panaousis, Emmanouil et al. | 2023
-
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makersPirca, Ana Maria / Lallie, Harjinder Singh et al. | 2023
-
Automated GDPR compliance assessment for cross-border personal data transfers in android applicationsGuamán, Danny S. / Rodriguez, David / del Alamo, Jose M. / Such, Jose et al. | 2023
-
GAMBD: Generating adversarial malware against MalConvLi, Kun / Guo, Wei / Zhang, Fan / Du, Jiayu et al. | 2023
-
DDOFM: Dynamic malicious domain detection method based on feature miningWang, Han / Tang, Zhangguo / Li, Huanzhou / Zhang, Jian / Cai, Cheng et al. | 2023
-
Editorial Board| 2019
-
Few-shot weakly-supervised cybersecurity anomaly detectionKale, Rahul / Thing, Vrizlynn L.L. et al. | 2023
-
Why people replace their aging smart devices: A push–pull–mooring perspectiveLenz, Julia / Bozakov, Zdravko / Wendzel, Steffen / Vrhovec, Simon et al. | 2023
-
A novel Evil Twin MiTM attack through 802.11v protocol exploitationLouca, Constantinos / Peratikou, Adamantini / Stavrou, Stavros et al. | 2023
-
NE-GConv: A lightweight node edge graph convolutional network for intrusion detectionAltaf, Tanzeela / Wang, Xu / Ni, Wei / Liu, Ren Ping / Braun, Robin et al. | 2023
-
A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learningBhat, Parnika / Behal, Sunny / Dutta, Kamlesh et al. | 2023
-
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intentionJiang, Randi / Zhang, Jianru et al. | 2023
-
C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurementDong, Cong / Yang, Jiahai / Liu, Song / Wang, Zhi / Liu, Yuling / Lu, Zhigang et al. | 2023
-
An intelligent recommendation method based on multi-interest network and adversarial deep learningMeng, Shunmei / Li, Qianmu / Qi, Lianyong / Xu, Xiaolong / Yuan, Rui / Zhang, Xuyun et al. | 2023
-
The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banksAebissa, Berhanu / Dhillon, Gurpreet / Meshesha, Million et al. | 2023
-
Improving ransomware detection based on portable executable header using xception convolutional neural networkMoreira, Caio C. / Moreira, Davi C. / Sales Jr., Claudomiro de S. de et al. | 2023
-
Analyzing effective mitigation of DDoS attack with software defined networkingDayal, Neelam / Srivastava, Shashank et al. | 2023
-
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledgeSun, Peishuai / Li, Shuhao / Xie, Jiang / Xu, Hongbo / Cheng, Zhenyu / Yang, Rong et al. | 2023
-
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platformsTaleby Ahvanooey, Milad / Zhu, Mark Xuefang / Ou, Shiyan / Dana Mazraeh, Hassan / Mazurczyk, Wojciech / Choo, Kim-Kwang Raymond / Li, Chuan et al. | 2023
-
Cyber expert feedback: Experiences, expectations, and opinions about cyber deceptionFerguson-Walter, Kimberly J. / Major, Maxine M. / Johnson, Chelsea K. / Johnson, Craig J. / Scott, Dakota D. / Gutzwiller, Robert S. / Shade, Temmie et al. | 2023
-
Learning domain-invariant representation for generalizing face forgery detectionWu, Yuanlu / Wo, Yan / Li, Caiyu / Han, Guoqiang et al. | 2023
-
The meta attack language - a formal descriptionWideł, Wojciech / Hacks, Simon / Ekstedt, Mathias / Johnson, Pontus / Lagerström, Robert et al. | 2023