Статті в журналах з теми "Usable security and privacy"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Usable security and privacy".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Fischer-Hübner, Simone, Luigi Lo Iacono, and Sebastian Möller. "Usable Security und Privacy." Datenschutz und Datensicherheit - DuD 34, no. 11 (November 2010): 773–82. http://dx.doi.org/10.1007/s11623-010-0210-4.
Повний текст джерелаAlt, Florian, and Emanuel von Zezschwitz. "Emerging Trends in Usable Security and Privacy." i-com 18, no. 3 (November 18, 2019): 189–95. http://dx.doi.org/10.1515/icom-2019-0019.
Повний текст джерелаChiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.
Повний текст джерелаAlemerien, Khalid. "Usable Security and Privacy on Online Social Networks." International Journal of Software Innovation 9, no. 2 (April 2021): 35–68. http://dx.doi.org/10.4018/ijsi.2021040103.
Повний текст джерелаKarat, Clare-Marie, Carolyn Brodie, and John Karat. "Usable privacy and security for personal information management." Communications of the ACM 49, no. 1 (January 2006): 56–57. http://dx.doi.org/10.1145/1107458.1107491.
Повний текст джерелаShay, Rich. "CyLab Usable Privacy and Security Laboratory (Pittsburgh, PA)." XRDS: Crossroads, The ACM Magazine for Students 20, no. 1 (September 2013): 62–63. http://dx.doi.org/10.1145/2508976.
Повний текст джерелаFaraz, Syed Hassan, Syed Hassan Tanvir, and Saqib Saeed. "A Study on Privacy and Security Aspects of Facebook." International Journal of Technology Diffusion 3, no. 4 (October 2012): 48–55. http://dx.doi.org/10.4018/jtd.2012100105.
Повний текст джерелаPapoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (February 4, 2021): 1396. http://dx.doi.org/10.3390/app11041396.
Повний текст джерелаDistler, Verena, Matthias Fassl, Hana Habib, Katharina Krombholz, Gabriele Lenzini, Carine Lallemand, Lorrie Faith Cranor, and Vincent Koenig. "A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research." ACM Transactions on Computer-Human Interaction 28, no. 6 (December 31, 2021): 1–50. http://dx.doi.org/10.1145/3469845.
Повний текст джерелаDas, Sauvik. "Computer scientists in action: Sauvik Das, usable security & privacy." XRDS: Crossroads, The ACM Magazine for Students 25, no. 1 (October 2018): 61–62. http://dx.doi.org/10.1145/3265929.
Повний текст джерелаSauer, Graig, Jonathan Holman, Jonathan Lazar, Harry Hochheiser, and Jinjuan Feng. "Accessible privacy and security: a universally usable human-interaction proof tool." Universal Access in the Information Society 9, no. 3 (March 25, 2010): 239–48. http://dx.doi.org/10.1007/s10209-009-0171-2.
Повний текст джерелаKoskela, Joakim, Kristiina Karvonen, and Theofanis Kilinkaridis. "Usable and Secure P2P VoIP for Mobile Use." International Journal of Mobile Human Computer Interaction 7, no. 1 (January 2015): 25–41. http://dx.doi.org/10.4018/ijmhci.2015010102.
Повний текст джерелаWahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.
Повний текст джерелаKinder, Petal. "Free, Open, and Re-Usable Access to Legal Information – The Australian Experience." International Journal of Legal Information 45, no. 1 (March 2017): 45–48. http://dx.doi.org/10.1017/jli.2017.12.
Повний текст джерелаVorakulpipat, Chalee, Sasakorn Pichetjamroen, and Ekkachan Rattanalerdnusorn. "Usable comprehensive-factor authentication for a secure time attendance system." PeerJ Computer Science 7 (August 16, 2021): e678. http://dx.doi.org/10.7717/peerj-cs.678.
Повний текст джерелаAl-Rayani, Bodoor Ayeed, Morooj Saleh Al-Ghamdi, and Jawaher Abdulrahman Al-Harbi. "Looking at Authentication Methods under the Demand of Usable Security and Privacy: A Review." OALib 09, no. 10 (2022): 1–12. http://dx.doi.org/10.4236/oalib.1109348.
Повний текст джерелаGarfinkel, Simson L. "Privacy and Security Concerns When Social Scientists Work with Administrative and Operational Data." ANNALS of the American Academy of Political and Social Science 675, no. 1 (December 21, 2017): 83–101. http://dx.doi.org/10.1177/0002716217737267.
Повний текст джерелаLing, Zhen, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, and Wei Zhao. "Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing." Wireless Communications and Mobile Computing 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/3928261.
Повний текст джерелаRocheleau, Jessica N., and Sonia Chiasson. "Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers’ Attitudes and Behaviors." ACM Transactions on Computer-Human Interaction 29, no. 1 (February 28, 2022): 1–39. http://dx.doi.org/10.1145/3469859.
Повний текст джерелаFramner, Erik, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, and John Sören Pettersson. "Making secret sharing based cloud storage usable." Information & Computer Security 27, no. 5 (November 11, 2019): 647–67. http://dx.doi.org/10.1108/ics-01-2019-0016.
Повний текст джерелаAliyu, Mansur. "Assessing User’s Perception on Security Challenges of Selected E-Commerce Websites in Nigeria." SLU Journal of Science and Technology 4, no. 1&2 (July 20, 2022): 177–87. http://dx.doi.org/10.56471/slujst.v4i.280.
Повний текст джерелаPlenz, Maik, Chaoyu Dong, Florian Grumm, Marc Florian Meyer, Marc Schumann, Malcom McCulloch, Hongjie Jia, and Detlef Schulz. "Framework Integrating Lossy Compression and Perturbation for the Case of Smart Meter Privacy." Electronics 9, no. 3 (March 10, 2020): 465. http://dx.doi.org/10.3390/electronics9030465.
Повний текст джерелаR, Kamatchi, Kimaya Ambekar, and Yash Parikh. "Security Mapping of a Usage Based Cloud System." Network Protocols and Algorithms 8, no. 4 (January 15, 2017): 56. http://dx.doi.org/10.5296/npa.v8i4.10240.
Повний текст джерелаEnaizan, Odai, Ashraf Saleh, Bilal Eneizan, Mohammad Almaaitah, and Asaad Alsakarneh. "Understanding and Predicting the Determinants of Consumers’ Acceptance and Usage of M-commerce Application: Hybrid SEM and Neural Network Approach." Emerging Science Journal 6, no. 6 (December 1, 2022): 1507–24. http://dx.doi.org/10.28991/esj-2022-06-06-018.
Повний текст джерелаChatterjee, Sheshadri. "Factors Impacting Behavioral Intention of Users to Adopt IoT In India." International Journal of Information Security and Privacy 14, no. 4 (October 2020): 92–112. http://dx.doi.org/10.4018/ijisp.2020100106.
Повний текст джерелаAbdelkarim Almajali, Dmaithan. "Determinants of Online Behavior Among Jordanian Consumers: An Empirical Study of OpenSooq." Interdisciplinary Journal of Information, Knowledge, and Management 17 (2022): 339–59. http://dx.doi.org/10.28945/4994.
Повний текст джерелаSaleh, Ashraf, Odai Enaizan, Bilal Eneizan, Lu’ay Al-Mu’ani, Ahmad Al-Radaideh, and Feras Hanandeh. "A Hybrid SEM and Neural Network Approach to Understand and Predict the Determinants of Consumers’ Acceptance and Usage of Mobile-Commerce Application." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 21 (November 15, 2022): 125–52. http://dx.doi.org/10.3991/ijim.v16i21.31815.
Повний текст джерелаAmin, Amr, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy. "AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach." Information 10, no. 10 (October 22, 2019): 326. http://dx.doi.org/10.3390/info10100326.
Повний текст джерелаHolzinger, Andreas. "Introduction to MAchine Learning & Knowledge Extraction (MAKE)." Machine Learning and Knowledge Extraction 1, no. 1 (July 3, 2017): 1–20. http://dx.doi.org/10.3390/make1010001.
Повний текст джерелаChangchit, Chuleeporn, and Kallol Bagchi. "Privacy and Security Concerns with Healthcare Data and Social Media Usage." Journal of Information Privacy and Security 13, no. 2 (April 3, 2017): 49–50. http://dx.doi.org/10.1080/15536548.2017.1322413.
Повний текст джерелаAlshare, Khaled A., Peggy L. Lane, and Michael R. Lane. "Information security policy compliance: a higher education case study." Information & Computer Security 26, no. 1 (March 12, 2018): 91–108. http://dx.doi.org/10.1108/ics-09-2016-0073.
Повний текст джерелаAl Quhtani, Masoud. "Data Mining Usage in Corporate Information Security: Intrusion Detection Applications." Business Systems Research Journal 8, no. 1 (March 28, 2017): 51–59. http://dx.doi.org/10.1515/bsrj-2017-0005.
Повний текст джерелаDarmiasih, Made, and Putu Yudi Setiawan. "Continuance usage intention and its antecedents on using OVO e-wallet application in Denpasar." International research journal of management, IT and social sciences 8, no. 1 (December 21, 2020): 35–46. http://dx.doi.org/10.21744/irjmis.v8n1.1104.
Повний текст джерелаShafie, Emad. "Vulnerability of Saudi Private Sector Organisations to Cyber Threats and Methods to Reduce the Vulnerability." Pertanika Journal of Science and Technology 30, no. 3 (April 20, 2022): 1909–26. http://dx.doi.org/10.47836/pjst.30.3.08.
Повний текст джерелаAl-Abdullah, Muhammad, Izzat Alsmadi, Ruwaida AlAbdullah, and Bernie Farkas. "Designing privacy-friendly data repositories: a framework for a blockchain that follows the GDPR." Digital Policy, Regulation and Governance 22, no. 5/6 (November 26, 2020): 389–411. http://dx.doi.org/10.1108/dprg-04-2020-0050.
Повний текст джерелаSattar, Mian Usman, Amna Mubashar, Rimsha Fareed, and Muhammad Rizwan. "Architectures, Security Issues, and Usage Scenarios of EC." UMT Artificial Intelligence Review 1, no. 1 (June 30, 2021): 1. http://dx.doi.org/10.32350/umtair.11.04.
Повний текст джерелаLejap, Hedwig H. T., Maria Augustin Lopes Amaral Amaral, Selfiana Goetha, Engelbertus G. Ch Watu, and Apryanus Fallo. "DETERMINANT FACTORS OF MOBILE BANKING USAGE: CASE STUDY IN KUPANG, EAST NUSA TENGGARA." Jurnal REP (Riset Ekonomi Pembangunan) 6, no. 2 (October 1, 2021): 232–50. http://dx.doi.org/10.31002/rep.v6i2.5457.
Повний текст джерелаKapp, Alexandra. "Collection, usage and privacy of mobility data in the enterprise and public administrations." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 440–56. http://dx.doi.org/10.56553/popets-2022-0117.
Повний текст джерелаMartucci, William C., and Brent N. Coverdale. "New protections in employee privacy rights regarding usage and disclosure of social security numbers." Employment Relations Today 29, no. 4 (2003): 69–77. http://dx.doi.org/10.1002/ert.10066.
Повний текст джерелаBamidis, P., C. Bond, E. Gabarron, M. Househ, A. Y. S. Lau, M. A. Mayer, M. Merolli, M. Hansen, and K. Denecke. "Ethical Issues of Social Media Usage in Healthcare." Yearbook of Medical Informatics 24, no. 01 (August 2015): 137–47. http://dx.doi.org/10.15265/iy-2015-001.
Повний текст джерелаWilson, Virginia. "Post-Secondary Students Prefer IM to Email for Personal and Social Communication." Evidence Based Library and Information Practice 3, no. 1 (March 17, 2008): 61. http://dx.doi.org/10.18438/b82s56.
Повний текст джерелаKouroubali, Angelina, Lefteris Koumakis, Haridimos Kondylakis, and Dimitrios G. Katehakis. "Smart Healthcare Apps for Quality Cancer Patient Support." International Journal of Big Data and Analytics in Healthcare 5, no. 1 (January 2020): 28–48. http://dx.doi.org/10.4018/ijbdah.2020010103.
Повний текст джерелаBin Kasim, Hairoladenan, Zul-Azri Bin Ibrahim, and Mutahir Bin Mohamed Ariff. "Digital Energy Hub for Optimizing Energy Usage: A Review." International Journal of Engineering & Technology 7, no. 4.36 (December 9, 2018): 453. http://dx.doi.org/10.14419/ijet.v7i4.36.23915.
Повний текст джерелаMerlec, Mpyana Mwamba, Youn Kyu Lee, Seng-Phil Hong, and Hoh Peter In. "A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR." Sensors 21, no. 23 (November 30, 2021): 7994. http://dx.doi.org/10.3390/s21237994.
Повний текст джерелаXu, Ronghua, Yu Chen, Genshe Chen, and Erik Blasch. "SAUSA: Securing Access, Usage, and Storage of 3D Point CloudData by a Blockchain-Based Authentication Network." Future Internet 14, no. 12 (November 28, 2022): 354. http://dx.doi.org/10.3390/fi14120354.
Повний текст джерелаAalto, Leena, Pia Sirola, Tiina Kalliomäki-Levanto, Marjaana Lahtinen, Virpi Ruohomäki, Heidi Salonen, and Kari Reijula. "User-centric work environments in modular healthcare facilities." Engineering, Construction and Architectural Management 26, no. 6 (July 15, 2019): 1047–62. http://dx.doi.org/10.1108/ecam-04-2018-0169.
Повний текст джерелаM.O, MUKOLU, ADELEKE K.O, and ILLUGBEMI A.O. "The Impact of Banking Industry on Customers Perception of Privacy, Risk and Security on Internet Banking Usage." International Review of Management and Business Research 8, no. 1 (March 5, 2019): 89–98. http://dx.doi.org/10.30543/8-1(2019)-7.
Повний текст джерелаWass, S., and V. Vimarlund. "Big Data, Smart Homes and Ambient Assisted Living." Yearbook of Medical Informatics 23, no. 01 (August 2014): 143–49. http://dx.doi.org/10.15265/iy-2014-0011.
Повний текст джерелаZimmermann, Sina, and Nina Gerber. "Why Do People Use Digital Applications? A Qualitative Analysis of Usage Goals and Psychological Need Fulfillment." i-com 18, no. 3 (November 18, 2019): 271–85. http://dx.doi.org/10.1515/icom-2018-0041.
Повний текст джерелаAlarefi, Mohammed. "Cloud computing usage by governmental organizations in Saudi Arabia based on Vision 2030." Uncertain Supply Chain Management 11, no. 1 (2023): 169–78. http://dx.doi.org/10.5267/j.uscm.2022.10.010.
Повний текст джерела