–吃 发表于 2025-3-30 11:36:10
HCI for Cybersecurity, Privacy and Trust978-3-030-50309-3Series ISSN 0302-9743 Series E-ISSN 1611-3349seruting 发表于 2025-3-30 15:21:41
http://reply.papertrans.cn/43/4202/420133/420133_52.pngAMPLE 发表于 2025-3-30 19:15:49
http://reply.papertrans.cn/43/4202/420133/420133_53.pngGLUE 发表于 2025-3-30 22:23:26
http://reply.papertrans.cn/43/4202/420133/420133_54.png步兵 发表于 2025-3-31 03:14:08
http://reply.papertrans.cn/43/4202/420133/420133_55.png绕着哥哥问 发表于 2025-3-31 06:34:36
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Gamof a study addressing the impact of gamification features on acceptance of the CybAR game. The theoretical model was tested in a quantitative study using structural equation modelling, conducted in Australia, with 95 Macquarie University students. The findings indicate that there is a significant recruise 发表于 2025-3-31 12:40:22
Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?tyle had a significant effect on avoidance behaviour. In particular, rational decision-making was a strongly significant moderator of avoidance behaviour and cybersecurity avoidance behaviour, while dependent and avoidant styles were less significant moderators of avoidance behaviour and cybersecuri抵消 发表于 2025-3-31 13:20:17
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machinenot relate to any cyber-security behaviors, however a number of individual differences were associated. These behaviors include financial risk-taking, avoidant decision-making plus ease of use, facilitating conditions, and trust in the internet. It was also found that safer cyber-security behaviors现实 发表于 2025-3-31 19:47:50
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviouations. We did not find any factors that influence security awareness professionals’ usage of rewards and sanctions. Our findings suggest the need for a greater consideration of the human element of cyber security. In particular, campaigns should take a more informed approach to use of behaviour cha收养 发表于 2025-3-31 23:23:27
http://reply.papertrans.cn/43/4202/420133/420133_60.png