37
Views
1
CrossRef citations to date
0
Altmetric
Articles

Altering Security Perceptions Through the Use of Geo-Authentication

, &

REFERENCES

  • Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM 42(12), 40 –46.
  • Applegate, S. D. (2009). Social engineering: Hacking the wetware! Information Security Journal: A Global Perspective 18(1), 40 –46.
  • Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future directions for behavioral information security research. Computers & Security 32(1), 90 –101.
  • Denning, D., & MacDoran, P. (1996). Location-based authentication: Grounding cyberspace for better security. Computer Fraud & Security 1996 (2), 12 –16.
  • Dinev, T., & Hu, Q. (2007). The centrality of awareness in the formation of user behavioral intention toward protective information technologies. Journal of the Association for Information Systems, 8(7), 386 –408.
  • Dodge, R., Jr., Carver, C., & Ferguson, A. (2007). Phishing for user security awareness. Computers & Security, 26(1), 73 –80.
  • Gurung, A., Luo, X., & Raja, M. K. (2008). An empirical investigation on customer’s privacy perceptions, trust & security awareness in E-commerce environment. Journal of Information Privacy & Security, 4(1), 42 –60.
  • Hadnagy, C. (2011). Social engineering: The art of human hacking. Indianapolis, IN: Wiley.
  • Jagatic, T., Johnson, N., Jakobsson, M., & Menczer, F. (2007). Social phishing. Communications of the ACM, 50(10), 94 –100.
  • Liu, L., Yu, E., & Mylopoulos, J. (2003, September). Security and privacy requirements analysis within a social setting. In Proceedings of the 11th IEEE International Requirements Engineering Conference on Requirements Engineering (RE ′03) (pp. 151–161). Washington, DC: IEEE Computer Society.
  • Luo, X., Brody, R., Seazzu, A., & Burd, S. (2011). Social engineering: The neglected human factor for information security management. Information Resources Management Journal, 24(3), 1 –8.
  • Peltier, T. (2006). Social engineering: Concepts & solutions. Information Systems Security, 15(5), 13 –21.
  • Raskin, V., Taylor, J. M., & Hempelmann, C. F. (2010, September). Ontological semantic technology for detecting insider threat and social engineering. In Proceedings of the 2010 Workshop on New Security Paradigms (NSPW ′10) (pp. 115–128). New York, NY: ACM.
  • Rubin, A. D. (2002). Security considerations for remote electronic voting. Communications of the ACM, 45(12), 39 –44.
  • Scott, L., & Denning, D. (2003, January). A location-based encryption technique & some of its applications. In Proceedings of the 2003 National Technical Meeting of The Institute of Navigation (NTM 2003) (pp. 734–740). Anaheim, CA: The Institute of Navigation.
  • Stajano, F., & Wilson, P. (2011). Understanding scam victims: Seven principles for systems. Communications of the ACM, 54 (3), 70 –75.
  • Warkentin, M., & Willison, R. (2009). Behavioral & policy issues in information systems security: The insider threat. European Journal of Information Systems, 18(2), 101 –105.
  • Workman, M. (2007). Gaining access with social engineering: An empirical study of the threat. Information Systems Security, 16(6), 315 –331.
  • Yan, G., Lin, J., Rawat, D. B., & Yang, W. (2011). A geographic location-based security mechanism for intelligent vehicular networks. In Intelligent Computing and Information Science ( pp. 693 –698). Berlin, Germany: Springer.
  • Yan, G., & Olariu, S. (2009, October). An efficient geographic location-based security mechanism for mobile ad hoc networks. In Proceedings of the 6th IEEE International Conference on Mobile Ad Hoc & Sensor Systems (pp. 804–809). Vancouver, Canada: IEEE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.