AIoT-enabled smart surveillance for personal data digitalization: Contextual personalization-privacy paradox in smart home

F Zhang, Z Pan, Y Lu - Information & Management, 2023 - Elsevier
Artificial intelligence of things technology provides smart surveillance capability for personal
data digitalization. It will invade individuals' information, physical, and social spaces and …

Identity, crimes, and law enforcement in the metaverse

HX Qin, Y Wang, P Hui - Humanities and Social Sciences …, 2025 - nature.com
The recent Metaverse technology boom in major areas of the public's life makes the safety of
users a pressing concern. Though the nature of the Metaverse as a geographically …

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

B AlGhanboosi, S Ali, A Tarhini - Computers in Human Behavior, 2023 - Elsevier
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …

A multi-analytical SEM-ANN approach to investigate the social sustainability of AI chatbots based on cybersecurity and protection motivation theory

I Arpaci - IEEE Transactions on Engineering Management, 2023 - ieeexplore.ieee.org
With a primary focus on cybersecurity risks, this study endeavors to explore the sustainable
deployment of artificial intelligence (AI) chatbots and, ultimately, to promote their social …

Gig workers' self-protective behaviour against legal risks: an application of protection motivation theory

WCW Au, NKF Tsang - International Journal of Contemporary …, 2023 - emerald.com
Purpose Given the illegal nature of the gig economy in some cities, this study aims to draw
on protection motivation theory to examine the formation of Uber drivers' self-protective …

Research on evolutionary game and simulation of information sharing in prefabricated building supply chain

R Zhang, L Li - Sustainability, 2023 - mdpi.com
Enterprises in the prefabricated building supply chain (PBSC) only share information
according to their interests, which is bound to cause conflicts of interest and reduce the …

Examining the factors that influence user information security behavior toward COVID-19 scams

A Al-Balushi, A Tarhini, F Acikgoz… - International Journal of …, 2024 - Taylor & Francis
Amidst the COVID-19 pandemic, cybercriminals have capitalized on the situation and
targeted online users. As a result, there has been a surge in the number of complaints …

Sharing information about medical crowdfunding projects on social networking sites: the integration of attribution-affect model of hel** and social capital theory

Z Deng, J Xue, T Wu, Z Chen - Information Technology & People, 2024 - emerald.com
Purpose Sharing project information is critical for the success of medical crowdfunding
campaigns. However, few users share medical crowdfunding projects on their social …

Design of surveillance technologies and privacy concerns

R Ahmad, U Gal, N Liu - 2023 - scholarspace.manoa.hawaii.edu
Researchers from numerous management, social sciences and psychological disciplines
have attempted to investigate the phenomenon of surveillance and the way it influences …

Emphasizing Severity over Susceptibility: The Impact of Threat Warnings in Health Rumor Rebuttals

XL Shen, Y Wu - 2023 - aisel.aisnet.org
Designing effective rebuttals to combat online health rumors is a critical issue that has
received increasing attention, yet it remains largely unexplored. Previous studies on rumor …