2015
DOI: 10.1080/08874417.2015.11645769
|View full text |Cite
|
Sign up to set email alerts
|

Education and Prevention Relationships on Security Incidents for Home Computers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…Users who are aware of threats are also more engaged in protective practices (Hanus & Wu, 2016). Therefore, effective security training and education programs should take a systematic approach by making sure they address the multiple dimensions of security awareness (G. L. White, 2015). Effective information security awareness and training programs should lead to improvement in graduates' ability to exercise protective reactions.…”
Section: Discussionmentioning
confidence: 99%
“…Users who are aware of threats are also more engaged in protective practices (Hanus & Wu, 2016). Therefore, effective security training and education programs should take a systematic approach by making sure they address the multiple dimensions of security awareness (G. L. White, 2015). Effective information security awareness and training programs should lead to improvement in graduates' ability to exercise protective reactions.…”
Section: Discussionmentioning
confidence: 99%
“…For a human working at a computer, it is significant to be able to monitor human behavior by collecting data on the operations of mouse clicking, sliding, scrolling, takingup-putting-down, etc., for process monitoring, behavior recognition, human-machine interfaces, and healthcare monitoring [32][33][34]. The phenomenon of interest is that there are various combinations of different operations engaged in by a human performing different tasks using a computer.…”
Section: Computer User Bevavior Monitoring By the Hybrid Nanogeneratormentioning
confidence: 99%
“…Considering the common features of TENGs and PENGs, being based on surface charging of functional films, preparing TENG-PENG hybrids for concurrently sensing pressing and sliding motions represents an excellent option. Usage of computers has come to occupy a great part of daily human life; thus, the effective and precise collection of computer user behavior information is significant in various fields, such as health care, juvenile protection, safety recognition, and human-machine interfaces for artificial intelligence [32][33][34]. There are few works reporting computer user motion monitoring via nanogenerators, which is a significant topic to be explored.…”
Section: Introductionmentioning
confidence: 99%
“…Training about phishing can lead to users' heightened awareness of phishing attacks, which lowers their risk of becoming a victim (Jansson & von Solms, 2013). White (2012White ( , 2015 found a relationship between education and security incidents but they found a negative relationship. With both computer and security education and training (CSET), users should be able to recognize security incidents.…”
Section: Educationmentioning
confidence: 99%