"Security begins at home": Determinants of home computer and mobile device security behavior (English)
- New search for: Thompson, Nik
- New search for: Thompson, Nik
- New search for: McGill, Tanya Jane
- New search for: Wang, Xuequn
In:
Computers & security
;
70
; 376
;
2017
-
ISSN:
- Article (Journal) / Print
-
Title:"Security begins at home": Determinants of home computer and mobile device security behavior
-
Contributors:
-
Published in:Computers & security ; 70 ; 376
-
Publisher:
- New search for: Elsevier
-
Place of publication:Kidlington, Oxford
-
Publication date:2017
-
ISSN:
-
ZDBID:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 54.38
- Further information on Basic classification
-
Keywords:
-
Classification:
BKL: 54.38 Computersicherheit -
Source:
Table of contents – Volume 70
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
PriviPK: Certificate-less and secure email communicationAlSabah, Mashael / Tomescu, Alin / Lebedev, Ilia / Serpanos, Dimitrios / Devadas, Srini et al. | 2017
- 16
-
An enhanced optimization based algorithm for intrusion detection in SCADA networkS, Shitharth / D, Prince Winston et al. | 2017
- 27
-
On small-scale IT users' system architectures and cyber security: A UK case studyOsborn, Emma / Simpson, Andrew et al. | 2017
- 51
-
Network moving target defense technique based on collaborative mutationZhang, Hong-qi / Lei, Cheng / Chang, De-xian / Yang, Ying-jie et al. | 2017
- 72
-
Defining and identifying dominant information security cultures and subculturesda Veiga, Adéle / Martins, Nico et al. | 2017
- 95
-
Modeling and analyses of IP spoofing attack in 6LoWPAN networkMavani, Monali / Asawa, Krishna et al. | 2017
- 111
-
Investigation into the formation of information security influence: Network analysis of an emerging organisationDang-Pham, Duy / Pittayachawan, Siddhi / Bruno, Vince et al. | 2017
- 124
-
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systemsYousaf, Awais / Loan, Asim / Babiceanu, Radu F. / Maglaras, Leandros / Yousaf, Onaiza et al. | 2017
- 144
-
A distributed authentication model for composite Web servicesNacer, Hassina / Djebari, Nabil / Slimani, Hachem / Aissani, Djamil et al. | 2017
- 179
-
EvoPass: Evolvable graphical password against shoulder-surfing attacksYu, Xingjie / Wang, Zhan / Li, Yingjiu / Li, Liang / Zhu, Wen Tao / Song, Li et al. | 2017
- 199
-
IoTChecker: A data-driven framework for security analytics of Internet of Things configurationsMohsin, Mujahid / Anwar, Zahid / Zaman, Farhat / Al-Shaer, Ehab et al. | 2017
- 224
-
DroidInjector: A process injection-based dynamic tracking system for runtime behaviors of Android applicationsFan, Wenhao / Sang, Yaohui / Zhang, Daishuai / Sun, Ran / Liu, Yuan'an et al. | 2017
- 238
-
Flow-based intrusion detection: Techniques and challengesUmer, Muhammad Fahad / Sher, Muhammad / Bi, Yaxin et al. | 2017
- 255
-
A GA-LR wrapper approach for feature selection in network intrusion detectionKhammassi, Chaouki / Krichen, Saoussen et al. | 2017
- 278
-
Stalking the stalkers – detecting and deterring stalking behaviours using technology: A reviewEterovic-Soric, Brett / Choo, Kim-Kwang Raymond / Ashman, Helen / Mubarak, Sameera et al. | 2017
- 290
-
S-OpenSGX: A system-level platform for exploring SGX enclave-based computingChoi, Changho / Kwak, Nohyun / Jang, Jinsoo / Jang, Daehee / Oh, Kuenwhee / Kwag, Kyungsoo / Kang, Brent Byunghoon et al. | 2017
- 307
-
Secure and reliable object tracking in wireless sensor networksOracevic, Alma / Akbas, Serkan / Ozdemir, Suat et al. | 2017
- 319
-
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomaliesMoriano, Pablo / Achar, Soumya / Camp, L. Jean et al. | 2017
- 335
-
A novel privacy preserving user identification approach for network trafficClarke, N. / Li, F. / Furnell, S. et al. | 2017
- 351
-
An information-theoretic method for the detection of anomalies in network trafficCallegari, Christian / Giordano, Stefano / Pagano, Michele et al. | 2017
- 366
-
Sticky policies approach within cloud computingSpyra, Grzegorz / Buchanan, William J. / Ekonomou, Elias et al. | 2017
- 376
-
“Security begins at home”: Determinants of home computer and mobile device security behaviorThompson, Nik / McGill, Tanya Jane / Wang, Xuequn et al. | 2017
- 392
-
Android inter-app communication threats and detection techniquesBhandari, Shweta / Jaballah, Wafa Ben / Jain, Vineeta / Laxmi, Vijay / Zemmari, Akka / Gaur, Manoj Singh / Mosbah, Mohamed / Conti, Mauro et al. | 2017
- 422
-
Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robotsGuerrero-Higueras, Ángel Manuel / DeCastro-García, Noemí / Rodríguez-Lera, Francisco Javier / Matellán, Vicente et al. | 2017
- 436
-
Assessing and augmenting SCADA cyber security: A survey of techniquesNazir, Sajid / Patel, Shushma / Patel, Dilip et al. | 2017
- 455
-
Creating a strategic national knowledge architecture: A comparative analysis of knowledge source innovation in the ICS subfields of multimedia and IT securityRužičić, Vesna S. / Micić, Živadin M. et al. | 2017
- 467
-
The industrial control system cyber defence triage processCook, Allan / Janicke, Helge / Smith, Richard / Maglaras, Leandros et al. | 2017
- 482
-
ArOMA: An SDN based autonomic DDoS mitigation frameworkSahay, Rishikesh / Blanc, Gregory / Zhang, Zonghua / Debar, Hervé et al. | 2017
- 500
-
Effectiveness of synthesis in concolic deobfuscationBiondi, Fabrizio / Josse, Sébastien / Legay, Axel / Sirvent, Thomas et al. | 2017
- 516
-
Breaking into the vault: Privacy, security and forensic analysis of Android vault applicationsZhang, Xiaolu / Baggili, Ibrahim / Breitinger, Frank et al. | 2017
- 532
-
Secure data aggregation using access control and authentication for wireless sensor networksRazaque, Abdul / Rizvi, Syed S. et al. | 2017
- 546
-
Extending social networks with delegationAhmad, Adnan / Whitworth, Brian / Zeshan, Furkh / Bertino, Elisa / Friedman, Robert et al. | 2017
- 565
-
Score normalization applied to adaptive biometric systemsPisani, Paulo Henrique / Poh, Norman / de Carvalho, André C.P.L.F. / Lorena, Ana Carolina et al. | 2017
- 581
-
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoptionHo, Shuyuan Mary / Ocasio-Velázquez, Mónica / Booth, Cheryl et al. | 2017
- 596
-
A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer botsSaadat Beheshti, Seyed Mohammad Reza / Liatsis, Panos / Rajarajan, Muttukrishnan et al. | 2017
- 618
-
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprintsDassouki, Khaled / Safa, Haidar / Nassar, Mohamed / Hijazi, Abbas et al. | 2017
- 634
-
Design and evaluation of the highly insidious extreme phishing attacksZhao, Rui / John, Samantha / Karas, Stacy / Bussell, Cara / Roberts, Jennifer / Six, Daniel / Gavett, Brandon / Yue, Chuan et al. | 2017
- 648
-
A secure SDN based multi-RANs architecture for future 5G networksFu, Yulong / Yan, Zheng / Li, Hui / Xin, Xiao Long / Cao, Jin et al. | 2017
- 663
-
Persona-centred information security awarenessKi-Aries, Duncan / Faily, Shamal et al. | 2017
- 675
-
USB-based attacksNissim, Nir / Yahalom, Ran / Elovici, Yuval et al. | 2017
- 689
-
A pragmatic android malware detection procedurePalumbo, Paolo / Sayfullina, Luiza / Komashinskiy, Dmitriy / Eirola, Emil / Karhunen, Juha et al. | 2017
- 702
-
Towards the adaptation of SDC methods to stream miningMartínez Rodríguez, David / Nin, Jordi / Nuñez-del-Prado, Miguel et al. | 2017
- 723
-
Security assurance assessment methodology for hybrid cloudsHudic, Aleksandar / Smith, Paul / Weippl, Edgar R. et al. | 2017
- 744
-
Using machine learning to identify common flaws in CAPTCHA design: FunCAPTCHA case analysisHernández-Castro, Carlos Javier / R-Moreno, María D. / Barrero, David F. / Gibson, Stuart et al. | 2017
- CO2
-
Inside Front Cover - Editorial Board Page/Cover image legend if applicable| 2017