Journal articles on the topic 'Usable security and privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Usable security and privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fischer-Hübner, Simone, Luigi Lo Iacono, and Sebastian Möller. "Usable Security und Privacy." Datenschutz und Datensicherheit - DuD 34, no. 11 (November 2010): 773–82. http://dx.doi.org/10.1007/s11623-010-0210-4.
Full textAlt, Florian, and Emanuel von Zezschwitz. "Emerging Trends in Usable Security and Privacy." i-com 18, no. 3 (November 18, 2019): 189–95. http://dx.doi.org/10.1515/icom-2019-0019.
Full textChiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.
Full textAlemerien, Khalid. "Usable Security and Privacy on Online Social Networks." International Journal of Software Innovation 9, no. 2 (April 2021): 35–68. http://dx.doi.org/10.4018/ijsi.2021040103.
Full textKarat, Clare-Marie, Carolyn Brodie, and John Karat. "Usable privacy and security for personal information management." Communications of the ACM 49, no. 1 (January 2006): 56–57. http://dx.doi.org/10.1145/1107458.1107491.
Full textShay, Rich. "CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)." XRDS: Crossroads, The ACM Magazine for Students 20, no. 1 (September 2013): 62–63. http://dx.doi.org/10.1145/2508976.
Full textFaraz, Syed Hassan, Syed Hassan Tanvir, and Saqib Saeed. "A Study on Privacy and Security Aspects of Facebook." International Journal of Technology Diffusion 3, no. 4 (October 2012): 48–55. http://dx.doi.org/10.4018/jtd.2012100105.
Full textPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Full textDistler, Verena, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, and Vincent Koenig. "A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research." ACM Transactions on Computer-Human Interaction 28, no. 6 (December 31, 2021): 1–50. http://dx.doi.org/10.1145/3469845.
Full textDas, Sauvik. "Computer scientists in action: Sauvik Das, usable security & privacy." XRDS: Crossroads, The ACM Magazine for Students 25, no. 1 (October 2018): 61–62. http://dx.doi.org/10.1145/3265929.
Full textSauer, Graig, Jonathan Holman, Jonathan Lazar, Harry Hochheiser, and Jinjuan Feng. "Accessible privacy and security: a universally usable human-interaction proof tool." Universal Access in the Information Society 9, no. 3 (March 25, 2010): 239–48. http://dx.doi.org/10.1007/s10209-009-0171-2.
Full textKoskela, Joakim, Kristiina Karvonen, and Theofanis Kilinkaridis. "Usable and Secure P2P VoIP for Mobile Use." International Journal of Mobile Human Computer Interaction 7, no. 1 (January 2015): 25–41. http://dx.doi.org/10.4018/ijmhci.2015010102.
Full textWahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.
Full textKinder, Petal. "Free, Open, and Re-Usable Access to Legal Information – The Australian Experience." International Journal of Legal Information 45, no. 1 (March 2017): 45–48. http://dx.doi.org/10.1017/jli.2017.12.
Full textVorakulpipat, Chalee, Sasakorn Pichetjamroen, and Ekkachan Rattanalerdnusorn. "Usable comprehensive-factor authentication for a secure time attendance system." PeerJ Computer Science 7 (August 16, 2021): e678. http://dx.doi.org/10.7717/peerj-cs.678.
Full textAl-Rayani, Bodoor Ayeed, Morooj Saleh Al-Ghamdi, and Jawaher Abdulrahman Al-Harbi. "Looking at Authentication Methods under the Demand of Usable Security and Privacy: A Review." OALib 09, no. 10 (2022): 1–12. http://dx.doi.org/10.4236/oalib.1109348.
Full textGarfinkel, Simson L. "Privacy and Security Concerns When Social Scientists Work with Administrative and Operational Data." ANNALS of the American Academy of Political and Social Science 675, no. 1 (December 21, 2017): 83–101. http://dx.doi.org/10.1177/0002716217737267.
Full textLing, Zhen, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao. "Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing." Wireless Communications and Mobile Computing 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/3928261.
Full textRocheleau, Jessica N., and Sonia Chiasson. "Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers’ Attitudes and Behaviors." ACM Transactions on Computer-Human Interaction 29, no. 1 (February 28, 2022): 1–39. http://dx.doi.org/10.1145/3469859.
Full textFramner, Erik, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, and John Sören Pettersson. "Making secret sharing based cloud storage usable." Information & Computer Security 27, no. 5 (November 11, 2019): 647–67. http://dx.doi.org/10.1108/ics-01-2019-0016.
Full textAliyu, Mansur. "Assessing User’s Perception on Security Challenges of Selected E-Commerce Websites in Nigeria." SLU Journal of Science and Technology 4, no. 1&2 (July 20, 2022): 177–87. http://dx.doi.org/10.56471/slujst.v4i.280.
Full textPlenz, Maik, Chaoyu Dong, Florian Grumm, Marc Florian Meyer, Marc Schumann, Malcom McCulloch, Hongjie Jia, and Detlef Schulz. "Framework Integrating Lossy Compression and Perturbation for the Case of Smart Meter Privacy." Electronics 9, no. 3 (March 10, 2020): 465. http://dx.doi.org/10.3390/electronics9030465.
Full textR, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (January 15, 2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.
Full textEnaizan, Odai, Ashraf Saleh, Bilal Eneizan, Mohammad Almaaitah, and Asaad Alsakarneh. "Understanding and Predicting the Determinants of Consumers’ Acceptance and Usage of M-commerce Application: Hybrid SEM and Neural Network Approach." Emerging Science Journal 6, no. 6 (December 1, 2022): 1507–24. http://dx.doi.org/10.28991/esj-2022-06-06-018.
Full textChatterjee, Sheshadri. "Factors Impacting Behavioral Intention of Users to Adopt IoT In India." International Journal of Information Security and Privacy 14, no. 4 (October 2020): 92–112. http://dx.doi.org/10.4018/ijisp.2020100106.
Full textAbdelkarim Almajali, Dmaithan. "Determinants of Online Behavior Among Jordanian Consumers: An Empirical Study of OpenSooq." Interdisciplinary Journal of Information, Knowledge, and Management 17 (2022): 339–59. http://dx.doi.org/10.28945/4994.
Full textSaleh, Ashraf, Odai Enaizan, Bilal Eneizan, Lu’ay Al-Mu’ani, Ahmad Al-Radaideh, and Feras Hanandeh. "A Hybrid SEM and Neural Network Approach to Understand and Predict the Determinants of Consumers’ Acceptance and Usage of Mobile-Commerce Application." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 21 (November 15, 2022): 125–52. http://dx.doi.org/10.3991/ijim.v16i21.31815.
Full textAmin, Amr, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy. "AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach." Information 10, no. 10 (October 22, 2019): 326. http://dx.doi.org/10.3390/info10100326.
Full textHolzinger, Andreas. "Introduction to MAchine Learning & Knowledge Extraction (MAKE)." Machine Learning and Knowledge Extraction 1, no. 1 (July 3, 2017): 1–20. http://dx.doi.org/10.3390/make1010001.
Full textChangchit, Chuleeporn, and Kallol Bagchi. "Privacy and Security Concerns with Healthcare Data and Social Media Usage." Journal of Information Privacy and Security 13, no. 2 (April 3, 2017): 49–50. http://dx.doi.org/10.1080/15536548.2017.1322413.
Full textAlshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (March 12, 2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.
Full textAl Quhtani, Masoud. "Data Mining Usage in Corporate Information Security: Intrusion Detection Applications." Business Systems Research Journal 8, no. 1 (March 28, 2017): 51–59. http://dx.doi.org/10.1515/bsrj-2017-0005.
Full textDarmiasih, Made, and Putu Yudi Setiawan. "Continuance usage intention and its antecedents on using OVO e-wallet application in Denpasar." International research journal of management, IT and social sciences 8, no. 1 (December 21, 2020): 35–46. http://dx.doi.org/10.21744/irjmis.v8n1.1104.
Full textShafie, Emad. "Vulnerability of Saudi Private Sector Organisations to Cyber Threats and Methods to Reduce the Vulnerability." Pertanika Journal of Science and Technology 30, no. 3 (April 20, 2022): 1909–26. http://dx.doi.org/10.47836/pjst.30.3.08.
Full textAl-Abdullah, Muhammad, Izzat Alsmadi, Ruwaida AlAbdullah, and Bernie Farkas. "Designing privacy-friendly data repositories: a framework for a blockchain that follows the GDPR." Digital Policy, Regulation and Governance 22, no. 5/6 (November 26, 2020): 389–411. http://dx.doi.org/10.1108/dprg-04-2020-0050.
Full textSattar, Mian Usman, Amna Mubashar, Rimsha Fareed, and Muhammad Rizwan. "Architectures, Security Issues, and Usage Scenarios of EC." UMT Artificial Intelligence Review 1, no. 1 (June 30, 2021): 1. http://dx.doi.org/10.32350/umtair.11.04.
Full textLejap, Hedwig H. T., Maria Augustin Lopes Amaral Amaral, Selfiana Goetha, Engelbertus G. Ch Watu, and Apryanus Fallo. "DETERMINANT FACTORS OF MOBILE BANKING USAGE: CASE STUDY IN KUPANG, EAST NUSA TENGGARA." Jurnal REP (Riset Ekonomi Pembangunan) 6, no. 2 (October 1, 2021): 232–50. http://dx.doi.org/10.31002/rep.v6i2.5457.
Full textKapp, Alexandra. "Collection, usage and privacy of mobility data in the enterprise and public administrations." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 440–56. http://dx.doi.org/10.56553/popets-2022-0117.
Full textMartucci, William C., and Brent N. Coverdale. "New protections in employee privacy rights regarding usage and disclosure of social security numbers." Employment Relations Today 29, no. 4 (2003): 69–77. http://dx.doi.org/10.1002/ert.10066.
Full textBamidis, P., C. Bond, E. Gabarron, M. Househ, A. Y. S. Lau, M. A. Mayer, M. Merolli, M. Hansen, and K. Denecke. "Ethical Issues of Social Media Usage in Healthcare." Yearbook of Medical Informatics 24, no. 01 (August 2015): 137–47. http://dx.doi.org/10.15265/iy-2015-001.
Full textWilson, Virginia. "Post-Secondary Students Prefer IM to Email for Personal and Social Communication." Evidence Based Library and Information Practice 3, no. 1 (March 17, 2008): 61. http://dx.doi.org/10.18438/b82s56.
Full textKouroubali, Angelina, Lefteris Koumakis, Haridimos Kondylakis, and Dimitrios G. Katehakis. "Smart Healthcare Apps for Quality Cancer Patient Support." International Journal of Big Data and Analytics in Healthcare 5, no. 1 (January 2020): 28–48. http://dx.doi.org/10.4018/ijbdah.2020010103.
Full textBin Kasim, Hairoladenan, Zul-Azri Bin Ibrahim, and Mutahir Bin Mohamed Ariff. "Digital Energy Hub for Optimizing Energy Usage: A Review." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 453. http://dx.doi.org/10.14419/ijet.v7i4.36.23915.
Full textMerlec, Mpyana Mwamba, Youn Kyu Lee, Seng-Phil Hong, and Hoh Peter In. "A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR." Sensors 21, no. 23 (November 30, 2021): 7994. http://dx.doi.org/10.3390/s21237994.
Full textXu, Ronghua, Yu Chen, Genshe Chen, and Erik Blasch. "SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network." Future Internet 14, no. 12 (November 28, 2022): 354. http://dx.doi.org/10.3390/fi14120354.
Full textAalto, Leena, Pia Sirola, Tiina Kalliomäki-Levanto, Marjaana Lahtinen, Virpi Ruohomäki, Heidi Salonen, and Kari Reijula. "User-centric work environments in modular healthcare facilities." Engineering, Construction and Architectural Management 26, no. 6 (July 15, 2019): 1047–62. http://dx.doi.org/10.1108/ecam-04-2018-0169.
Full textM.O, MUKOLU, ADELEKE K.O, and ILLUGBEMI A.O. "The Impact of Banking Industry on Customers Perception of Privacy, Risk and Security on Internet Banking Usage." International Review of Management and Business Research 8, no. 1 (March 5, 2019): 89–98. http://dx.doi.org/10.30543/8-1(2019)-7.
Full textWass, S., and V. Vimarlund. "Big Data, Smart Homes and Ambient Assisted Living." Yearbook of Medical Informatics 23, no. 01 (August 2014): 143–49. http://dx.doi.org/10.15265/iy-2014-0011.
Full textZimmermann, Sina, and Nina Gerber. "Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment." i-com 18, no. 3 (November 18, 2019): 271–85. http://dx.doi.org/10.1515/icom-2018-0041.
Full textAlarefi, Mohammed. "Cloud computing usage by governmental organizations in Saudi Arabia based on Vision 2030." Uncertain Supply Chain Management 11, no. 1 (2023): 169–78. http://dx.doi.org/10.5267/j.uscm.2022.10.010.
Full text