Internet privacy concerns and social awareness as determinants of intention to transact
T Dinev, P Hart - International Journal of Electronic Commerce, 2005 - Taylor & Francis
This study focuses on antecedents to Internet privacy concerns and the behavioral intention
to conduct on-line transactions. Perceptions of privacy are socially constructed through …
to conduct on-line transactions. Perceptions of privacy are socially constructed through …
The email-diary: a promising research tool for the 21st century?
A Jones, J Woolley - Qualitative Research, 2015 - journals.sagepub.com
The global research community has identified that, as society becomes ever more mobile
and 24/7-oriented, data collection methods that reflect the day-to-day experiences of its …
and 24/7-oriented, data collection methods that reflect the day-to-day experiences of its …
Low-capture-power test generation for scan-based at-speed testing
X Wen, Y Yamashita, S Morishima… - … Conference on Test …, 2005 - ieeexplore.ieee.org
Scan-based at-speed testing is a key technology to guarantee timing-related test quality in
the deep submicron era. However, its applicability is being severely challenged since …
the deep submicron era. However, its applicability is being severely challenged since …
An investigation of email processing from a risky decision making perspective
The prevalence of cyber crimes has threatened the business model enabled by email. Users
have to evaluate email related risks before forming their attitude and read intention toward …
have to evaluate email related risks before forming their attitude and read intention toward …
Why spoofing is serious internet fraud
T Dinev - Communications of the ACM, 2006 - dl.acm.org
Why spoofing is serious internet fraud Page 1 76 October 2006/Vol. 49, No. 10
COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM October 2006/Vol …
COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM October 2006/Vol …
Older Adults' Perceptions of Online Risk
V Boothroyd - 2014 - repository.library.carleton.ca
Older adults are a growing group of Internet users, but they are also among the most
vulnerable for attack. We examine how older adults perceive risks involved in email and …
vulnerable for attack. We examine how older adults perceive risks involved in email and …
Dmarcbox–corporate email security and analytics using dmarc
T Nanaware, P Mohite, R Patil - 2019 IEEE 5th International …, 2019 - ieeexplore.ieee.org
Organizations often face an issue regarding the domain security. Attackers target the domain
itself in order to gain higher access for advanced attacks especially email phishing. Innocent …
itself in order to gain higher access for advanced attacks especially email phishing. Innocent …
Evaluating Twitter for use in environmental awareness campaigns
Many studies have shown that the effective harnessing of ICTs is critical in local, national,
and global efforts to adapt and mitigate the effects of climate change. Citizens must be …
and global efforts to adapt and mitigate the effects of climate change. Citizens must be …
Holmes: An efficient and lightweight semantic based anomalous email detector
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector Page 1
HOLMES: An Efficient and Lightweight Semantic Based Anomalous Email Detector Peilun Wu …
HOLMES: An Efficient and Lightweight Semantic Based Anomalous Email Detector Peilun Wu …
The security-liberty balance: individuals' attitudes towards internet government surveillance
In the Security-Liberty balance, individuals would weigh the benefits of government
surveillance against what the cost would be to our civil liberties. Drawing on Social …
surveillance against what the cost would be to our civil liberties. Drawing on Social …