AIoT-enabled smart surveillance for personal data digitalization: Contextual personalization-privacy paradox in smart home
Artificial intelligence of things technology provides smart surveillance capability for personal
data digitalization. It will invade individuals' information, physical, and social spaces and …
data digitalization. It will invade individuals' information, physical, and social spaces and …
Identity, crimes, and law enforcement in the metaverse
The recent Metaverse technology boom in major areas of the public's life makes the safety of
users a pressing concern. Though the nature of the Metaverse as a geographically …
users a pressing concern. Though the nature of the Metaverse as a geographically …
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …
other hand, criminals find social media applications a rich place to attack through techniques …
A multi-analytical SEM-ANN approach to investigate the social sustainability of AI chatbots based on cybersecurity and protection motivation theory
I Arpaci - IEEE Transactions on Engineering Management, 2023 - ieeexplore.ieee.org
With a primary focus on cybersecurity risks, this study endeavors to explore the sustainable
deployment of artificial intelligence (AI) chatbots and, ultimately, to promote their social …
deployment of artificial intelligence (AI) chatbots and, ultimately, to promote their social …
Gig workers' self-protective behaviour against legal risks: an application of protection motivation theory
WCW Au, NKF Tsang - International Journal of Contemporary …, 2023 - emerald.com
Purpose Given the illegal nature of the gig economy in some cities, this study aims to draw
on protection motivation theory to examine the formation of Uber drivers' self-protective …
on protection motivation theory to examine the formation of Uber drivers' self-protective …
Research on evolutionary game and simulation of information sharing in prefabricated building supply chain
R Zhang, L Li - Sustainability, 2023 - mdpi.com
Enterprises in the prefabricated building supply chain (PBSC) only share information
according to their interests, which is bound to cause conflicts of interest and reduce the …
according to their interests, which is bound to cause conflicts of interest and reduce the …
Examining the factors that influence user information security behavior toward COVID-19 scams
Amidst the COVID-19 pandemic, cybercriminals have capitalized on the situation and
targeted online users. As a result, there has been a surge in the number of complaints …
targeted online users. As a result, there has been a surge in the number of complaints …
Sharing information about medical crowdfunding projects on social networking sites: the integration of attribution-affect model of hel** and social capital theory
Purpose Sharing project information is critical for the success of medical crowdfunding
campaigns. However, few users share medical crowdfunding projects on their social …
campaigns. However, few users share medical crowdfunding projects on their social …
Design of surveillance technologies and privacy concerns
Researchers from numerous management, social sciences and psychological disciplines
have attempted to investigate the phenomenon of surveillance and the way it influences …
have attempted to investigate the phenomenon of surveillance and the way it influences …
Emphasizing Severity over Susceptibility: The Impact of Threat Warnings in Health Rumor Rebuttals
XL Shen, Y Wu - 2023 - aisel.aisnet.org
Designing effective rebuttals to combat online health rumors is a critical issue that has
received increasing attention, yet it remains largely unexplored. Previous studies on rumor …
received increasing attention, yet it remains largely unexplored. Previous studies on rumor …