Tuğçe Karayel, Bahadır Aktaş & Adem Akbıyık. (2024) Human factors in remote work: examining cyber hygiene practices. Information & Computer Security.
Crossref
Nora McDonald & Helena M. Mentis. (2023) 'Don't Fall for This': Communications about Cybersafety from the AARP. Proceedings of the ACM on Human-Computer Interaction 7:CSCW2, pages 1-21.
Crossref
John Alagood, Gayle Prybutok & Victor R. Prybutok. (2023) Navigating Privacy and Data Safety: The Implications of Increased Online Activity among Older Adults Post-COVID-19 Induced Isolation. Information 14:6, pages 346.
Crossref
Ann-Pierre Raiche, Léanne Dauphinais, Manon Duval, Gino De Luca, David Rivest-Hénault, Thomas Vaughan, Catherine Proulx & Jean-Pierre Guay. (2023) Factors influencing acceptance and trust of chatbots in juvenile offenders’ risk assessment training. Frontiers in Psychology 14.
Crossref
Carolin Hahnel, Ulf Kroehne & Frank Goldhammer. (2023) Rule-based process indicators of information processing explain performance differences in PIAAC web search tasks. Large-scale Assessments in Education 11:1.
Crossref
Alisa Frik, Julia Bernd & Serge Egelman. (2023) A Model of Contextual Factors Affecting Older Adults’ Information-Sharing Decisions in the U.S.. ACM Transactions on Computer-Human Interaction 30:1, pages 1-48.
Crossref
Cheng-Chia Yang, Shang-Yu Yang & Yu-Chia Chang. (2023) Predicting Older Adults’ Mobile Payment Adoption: An Extended TAM Model. International Journal of Environmental Research and Public Health 20:2, pages 1391.
Crossref
Ahmad R. Pratama, Nunu Vadila & Firman M. Firmansyah. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment.
Wilson Cheong Hin Hong, ChunYang Chi, Jia Liu, YunFeng Zhang, Vivian Ngan-Lin Lei & XiaoShu Xu. (2022) The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates. Education and Information Technologies 28:1, pages 439-470.
Crossref
Dandi Feng, Hiba Rafih & Cosmin Munteanu. 2023. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust
467
491
.
Jonas Ellefsen & Weiqin Chen. (2022) Privacy and Data Security in Everyday Online Services for Older Adults. Privacy and Data Security in Everyday Online Services for Older Adults.
Alisa Frik, Juliann Kim, Joshua Rafael Sanchez & Joanne Ma. (2022) Users’ Expectations About and Use of Smartphone Privacy and Security Settings. Users’ Expectations About and Use of Smartphone Privacy and Security Settings.
Ahmad R. Pratama, Firman M. Firmansyah & Fayruz Rahma. (2022) Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality. PeerJ Computer Science 8, pages e918.
Crossref
Shital Desai, Colleen McGrath, Heather McNeil, Heidi Sveistrup, Josephine McMurray & Arlene Astell. (2022) Experiential Value of Technologies: A Qualitative Study with Older Adults. International Journal of Environmental Research and Public Health 19:4, pages 2235.
Crossref
Sheri Gibson. 2022. Comprehensive Clinical Psychology. Comprehensive Clinical Psychology
114
128
.
Melvin Abraham, Michael Crabb & Saša Radomirović. 2022. Socio-Technical Aspects in Security. Socio-Technical Aspects in Security
86
107
.
Benjamin Morrison, Lynne Coventry & Pam Briggs. (2021) How do Older Adults feel about engaging with Cyber‐Security?. Human Behavior and Emerging Technologies 3:5, pages 1033-1049.
Crossref
Dr. Vasileios Karagiannopoulos, Dr. Annie Kirby, Shakiba Oftadeh-MoghadamMs.Ms. & Dr. Lisa Sugiura. (2021) Cybercrime awareness and victimisation in individuals over 60 years: A Portsmouth case study. Computer Law & Security Review 43, pages 105615.
Crossref
Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner & D. Eric Chan-Tin. (2021) Who creates strong passwords when nudging fails. Computers in Human Behavior Reports 4, pages 100132.
Crossref
Zheng Yan, Yukang Xue & Yaosheng Lou. (2021) Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers. Computers in Human Behavior 121, pages 106791.
Crossref
Afroditi Pina. 2021. Forensic Psychology. Forensic Psychology
609
629
.
Ahmad R. Pratama & Firman M. Firmansyah. (2021) Until you have something to lose! Loss aversion and two-factor authentication adoption. Applied Computing and Informatics.
Crossref
Savanthi Murthy, Karthik S. Bhat, Sauvik Das & Neha Kumar. (2021) Individually Vulnerable, Collectively Safe. Proceedings of the ACM on Human-Computer Interaction 5:CSCW1, pages 1-24.
Crossref
Hirak Ray, Flynn Wolf, Ravi Kuber & Adam J. Aviv. (2021) “Warn Them” or “Just Block Them”?: Investigating Privacy Concerns Among Older and Working Age Adults. Proceedings on Privacy Enhancing Technologies 2021:2, pages 27-47.
Crossref
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy & Farhan Bashir Shaikh. (2021) Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review. IEEE Access 9, pages 99339-99363.
Crossref
Cameron Coutu & Benoît Dupont. 2021. Cybercrime in Context. Cybercrime in Context
157
172
.
Fawn T. Ngo, Alex R. Piquero, Jennifer LaPrade & Bao Duong. (2020) Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?. Criminal Justice Review 45:4, pages 430-451.
Crossref
Benjamin A. Morrison, Lynne Coventry & Pam Briggs. (2020) Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults. Frontiers in Psychology 11.
Crossref
Mª Victoria Bordonaba-Juste, Laura Lucia-Palacios & Raúl Pérez-López. (2020) Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services. Information Systems and e-Business Management 18:1, pages 35-60.
Crossref
Lisa C. de Kok, Deborah Oosting & Marcel Spruit. (2020) The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour. Information & Security: An International Journal 46:3, pages 251-266.
Crossref
Ana Kovacevic, Nenad Putnik & Oliver Toskovic. (2020) Factors Related to Cyber Security Behavior. IEEE Access 8, pages 125140-125148.
Crossref
Kim Sawchuk & Constance Lafontaine. 2020. Human Aspects of IT for the Aged Population. Technologies, Design and User Experience. Human Aspects of IT for the Aged Population. Technologies, Design and User Experience
231
244
.
Margot J. van der Goot & Tyler Pilgrim. 2020. Chatbot Research and Design. Chatbot Research and Design
173
186
.
Yichen Dang, Cosmin Munteanu & Carrie Demmans Epp. (2019) Engaging Seniors through Automatically-Generated Photo Digests from their Families' Social Media. Engaging Seniors through Automatically-Generated Photo Digests from their Families' Social Media.
Benett Axtell & Cosmin Munteanu. (2019) Back to Real Pictures. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3:3, pages 1-24.
Crossref
Victoria Throfast, Lina Hellström, Bo Hovstadius, Göran Petersson & Lisa Ericson. (2017) e-Learning for the elderly on drug utilization: A pilot study. Health Informatics Journal 25:2, pages 227-239.
Crossref
James Nicholson, Lynne Coventry & Pamela Briggs. (2019) "If It's Important It Will Be A Headline". "If It's Important It Will Be A Headline".
René van Bavel, Nuria Rodríguez-Priego, José Vila & Pam Briggs. (2019) Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies 123, pages 29-39.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security
20
37
.
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. National Security. National Security
60
77
.
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Multigenerational Online Behavior and Media Use. Multigenerational Online Behavior and Media Use
407
424
.
Elizabeth Mazur, Margaret L. Signorella & Michelle Hough. 2019. Advanced Methodologies and Technologies in Media and Communications. Advanced Methodologies and Technologies in Media and Communications
405
416
.
Rita Bauer, Tasha Glenn, Sergio Strejilevich, Jörn Conell, Martin Alda, Raffaella Ardau, Bernhard T. Baune, Michael Berk, Yuly Bersudsky, Amy Bilderbeck, Alberto Bocchetta, Angela M. Paredes Castro, Eric Y. W. Cheung, Caterina Chillotti, Sabine Choppin, Alessandro Cuomo, Maria Del Zompo, Rodrigo Dias, Seetal Dodd, Anne Duffy, Bruno Etain, Andrea Fagiolini, Miryam Fernández Hernandez, Julie Garnham, John Geddes, Jonas Gildebro, Michael J. Gitlin, Ana Gonzalez-Pinto, Guy M. Goodwin, Paul Grof, Hirohiko Harima, Stefanie Hassel, Chantal Henry, Diego Hidalgo-Mazzei, Anne Hvenegaard Lund, Vaisnvy Kapur, Girish Kunigiri, Beny Lafer, Erik R. Larsen, Ute Lewitzka, Rasmus W. Licht, Blazej Misiak, Patryk Piotrowski, Ângela Miranda-Scippa, Scott Monteith, Rodrigo Munoz, Takako Nakanotani, René E. Nielsen, Claire O’Donovan, Yasushi Okamura, Yamima Osher, Andreas Reif, Philipp Ritter, Janusz K. Rybakowski, Kemal Sagduyu, Brett Sawchuk, Elon Schwartz, Claire Slaney, Ahmad H. Sulaiman, Kirsi Suominen, Aleksandra Suwalska, Peter Tam, Yoshitaka Tatebayashi, Leonardo Tondo, Julia Veeh, Eduard Vieta, Maj Vinberg, Biju Viswanath, Mark Zetin, Peter C. Whybrow & Michael Bauer. (2018) Internet use by older adults with bipolar disorder: international survey results. International Journal of Bipolar Disorders 6:1.
Crossref
Ashley A. Cain, Morgan E. Edwards & Jeremiah D. Still. (2018) An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications 42, pages 36-45.
Crossref
Travis C. Pratt. (2018) The Myth of the Tech-Savvy Teen and the Clueless Senior Citizen. Criminal Justice Review 43:3, pages 360-369.
Crossref
Fabrice Kämpfen & Jürgen Maurer. (2018) Does education help “old dogs” learn “new tricks”? The lasting impact of early-life education on technology use among older adults. Research Policy 47:6, pages 1125-1132.
Crossref
Radoslaw Nielek, Konrad Godles & Bartlomiej Balcerzak. (2018) What are real problems of older adults and how to solve it with smart home devices?. What are real problems of older adults and how to solve it with smart home devices?.
Elizabeth Mazur, Margaret L. Signorella & Michelle Hough. 2018. Encyclopedia of Information Science and Technology, Fourth Edition. Encyclopedia of Information Science and Technology, Fourth Edition
7026
7035
.
Jenay M. Beer & Otis L. Owens. 2018. Aging, Technology and Health. Aging, Technology and Health
237
259
.
Bartlomiej Balcerzak, Wieslaw Kopec, Radoslaw Nielek, Kamil Warpechowski & Agnieszka Czajka. 2018. Advances in Intelligent Systems and Computing II. Advances in Intelligent Systems and Computing II
40
53
.
Hsiao‐Ying Huang & Masooda Bashir. (2019) Surfing safely: Examining older adults' online privacy protection behaviors. Proceedings of the Association for Information Science and Technology 55:1, pages 188-197.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. (2017) Cyber Attacks, Contributing Factors, and Tackling Strategies. International Journal of Cyber Behavior, Psychology and Learning 7:4, pages 68-82.
Crossref
Yang Wang. (2017) The Third Wave?. The Third Wave?.
Claire M. White, Michaela Gummerum, Stacey Wood & Yaniv Hanoch. (2017) Internet Safety and the Silver Surfer: The Relationship Between Gist Reasoning and Adults' Risky Online Behavior. Journal of Behavioral Decision Making 30:4, pages 819-827.
Crossref
Bartlomiej Balcerzak, Wieslaw Kopec, Radoslaw Nielek, Sebastian Kruk, Kamil Warpechowski, Mateusz Wasik & Marek Wegrzyn. (2017) Press F1 for help: Participatory design for dealing with on-line and real life security of older adults. Press F1 for help: Participatory design for dealing with on-line and real life security of older adults.
Myung Ja Kim, Woo Gon Kim, Joung Man Kim & Chulwon Kim. (2016) Does knowledge matter to seniors’ usage of mobile devices? Focusing on motivation and attachment. International Journal of Contemporary Hospitality Management 28:8, pages 1702-1727.
Crossref
Rajarshi Chakraborty, Jaeung Lee, Sharmistha Bagchi-Sen, Shambhu Upadhyaya & H. Raghav Rao. (2016) Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems 83, pages 47-56.
Crossref
Tamirat Abegaz, Edward C. DillonJr.Jr. & Juan E. Gilbert. (2016) Investigating Perceived Usability and Choice Satisfaction of Alternative Search Engine’s Presentation for Older Adults. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 59:1, pages 80-84.
Crossref
Rachel L. Franz, Cosmin Munteanu, Barbara Barbosa Neves & Ronald Baecker. (2015) Time to Retire Old Methodologies? Reflecting on Conducting Usability Evaluations with Older Adults. Time to Retire Old Methodologies? Reflecting on Conducting Usability Evaluations with Older Adults.
Monica WhittyJames DoodsonSadie CreeseDuncan Hodges. (2015) Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology, Behavior, and Social Networking 18:1, pages 3-7.
Crossref
CATRINA DENVIR, NIGEL J. BALMER & PASCOE PLEASENCE. (2012) Portal or pot hole? Exploring how older people use the ‘information superhighway’ for advice relating to problems with a legal dimension. Ageing and Society 34:4, pages 670-699.
Crossref
Jorge Arenas-Gaitán, Begoña Peral-Peral & María Ángeles Ramón-Jerónimo. 2014. Strategies in E-Business. Strategies in E-Business
67
77
.
María A. Ramón-Jerónimo, Begoña Peral-Peral & Jorge Arenas-Gaitán. (2013) Elderly Persons and Internet Use. Social Science Computer Review 31:4, pages 389-403.
Crossref
Nigel Martin & John Rice. (2013) Spearing High Net Wealth Individuals. International Journal of Information Security and Privacy 7:1, pages 1-15.
Crossref
Lucia F. O'Sullivan. (2012) Open to the Public: How Adolescents Blur the Boundaries Online Between the Private and Public Spheres of Their Lives. Journal of Adolescent Health 50:5, pages 429-430.
Crossref
Elizabeth Mazur, Margaret L. Signorella & Michelle Hough. 2012. Encyclopedia of Cyber Behavior. Encyclopedia of Cyber Behavior
608
619
.