–吃
发表于 2025-3-30 11:36:10
HCI for Cybersecurity, Privacy and Trust978-3-030-50309-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
seruting
发表于 2025-3-30 15:21:41
http://reply.papertrans.cn/43/4202/420133/420133_52.png
AMPLE
发表于 2025-3-30 19:15:49
http://reply.papertrans.cn/43/4202/420133/420133_53.png
GLUE
发表于 2025-3-30 22:23:26
http://reply.papertrans.cn/43/4202/420133/420133_54.png
步兵
发表于 2025-3-31 03:14:08
http://reply.papertrans.cn/43/4202/420133/420133_55.png
绕着哥哥问
发表于 2025-3-31 06:34:36
The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Gamof a study addressing the impact of gamification features on acceptance of the CybAR game. The theoretical model was tested in a quantitative study using structural equation modelling, conducted in Australia, with 95 Macquarie University students. The findings indicate that there is a significant re
cruise
发表于 2025-3-31 12:40:22
Does Decision-Making Style Predict Individuals’ Cybersecurity Avoidance Behaviour?tyle had a significant effect on avoidance behaviour. In particular, rational decision-making was a strongly significant moderator of avoidance behaviour and cybersecurity avoidance behaviour, while dependent and avoidant styles were less significant moderators of avoidance behaviour and cybersecuri
抵消
发表于 2025-3-31 13:20:17
Examining Human Individual Differences in Cyber Security and Possible Implications for Human-Machinenot relate to any cyber-security behaviors, however a number of individual differences were associated. These behaviors include financial risk-taking, avoidant decision-making plus ease of use, facilitating conditions, and trust in the internet. It was also found that safer cyber-security behaviors
现实
发表于 2025-3-31 19:47:50
Human Cyber Risk Management by Security Awareness Professionals: Carrots or Sticks to Drive Behaviouations. We did not find any factors that influence security awareness professionals’ usage of rewards and sanctions. Our findings suggest the need for a greater consideration of the human element of cyber security. In particular, campaigns should take a more informed approach to use of behaviour cha
收养
发表于 2025-3-31 23:23:27
http://reply.papertrans.cn/43/4202/420133/420133_60.png