Related references
Note: Only part of the references are listed.A Survey of User Perspectives on Security and Privacy in a Home Networking Environment
Nandita Pattnaik et al.
ACM COMPUTING SURVEYS (2023)
Measuring Security Practices
Louis F. DeKoven et al.
COMMUNICATIONS OF THE ACM (2022)
A survey on blockchain, SDN and NFV for the smart-home security
N'guessan Yves-Roland Douha et al.
INTERNET OF THINGS (2022)
Cybersecurity awareness training programs: a cost-benefit analysis framework
Zuopeng (Justin) Zhang et al.
INDUSTRIAL MANAGEMENT & DATA SYSTEMS (2021)
How do Older Adults feel about engaging with Cyber-Security?
Benjamin Morrison et al.
HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES (2021)
Parents' knowledge and skills about the risks of the digital world
Lukasz Tomczyk et al.
SOUTH AFRICAN JOURNAL OF EDUCATION (2021)
Optimization of Cybersecurity Investment Strategies in the Smart Grid Using Game-Theory
Burhan Hyder et al.
2020 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT) (2020)
On the n-Dimensional Phase Portraits
Martin-Antonio Rodriguez-Licea et al.
APPLIED SCIENCES-BASEL (2019)
A New Model-based Framework for Testing Security of IoT Systems in Smart Cities using Attack Trees and Price Timed Automata
Moez Krichen et al.
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE) (2019)
Survey results on adults and cybersecurity education
Joseph Ricci et al.
EDUCATION AND INFORMATION TECHNOLOGIES (2019)
A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints
Anna Nagurney et al.
ANNALS OF OPERATIONS RESEARCH (2017)
Anonymous Secure Framework in Connected Smart Home Environments
Pardeep Kumar et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage
Ahmed A. Alabdel Abass et al.
IEEE ACCESS (2017)
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online
Alessandro Acquisti et al.
ACM COMPUTING SURVEYS (2017)
The replicator equation and other game dynamics
Ross Cressman et al.
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA (2014)
The Psychology of Security for the Home Computer User
Adele E. Howe et al.
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
Cyber security for home users: A new way of protection through awareness enforcement
E. Kritzinger et al.
COMPUTERS & SECURITY (2010)
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
John D'Arcy et al.
INFORMATION SYSTEMS RESEARCH (2009)
Security beliefs and barriers for novice Internet users
Steven Furnell et al.
COMPUTERS & SECURITY (2008)
Assessing the security perceptions of personal Internet users
S. M. Furnell et al.
COMPUTERS & SECURITY (2007)