This paper reports on a study aiming to explore factors associated with protection motivation of users on social networking sites. The objectives of this study were to determine how trust in internet ...service provider, trust in social media provider, trust in government, privacy concerns, fear of government intrusions, locus of control, and perceived threats affect protection motivation of users on social networking sites. The study employed a cross-sectional research design. A survey was conducted among University of Maribor students between October 2018 and January 2019. A total of 289 respondents completed the survey providing for N=276 useful responses after excluding poorly completed responses (27.9 percent response rate). The survey questionnaire was developed in English. A Slovenian translation of the survey questionnaire is available.
Users of information systems are the weakest link in information security. Considering their current information security performance is essential for improving information security training. User ...segmentation can help to improve information security training by dividing users into smaller groups based on their information security performance. In this paper, we present a segmented approach for information security training of users. To test the approach, we used data collected from students at a Slovenian university (<inline-formula> <tex-math notation="LaTeX">$\text{N}=165$ </tex-math></inline-formula>) with the Human Aspects of Information Security Questionnaire (HAIS-Q). HAIS-Q data was used to divide users into groups according to their information security performance via clustering. The proposed approach inherently balances adaptation of training to the needs of users and the efforts needed to achieve it which maximizes the key benefits of existing information security training approaches. With improved personalization, it mitigates the challenges related to training boringness and lack of user motivation which are emblematic for traditional information security training approaches. The proposed approach also offers some flexibility regarding the degree of personalization and the efforts related to information security training by fine-tuning the number of user groups. Finally, the proposed approach can help to identify beneficial software security requirements during development of new information systems.
Security and Privacy Issues of Home Globalization Caviglione, Luca; Wendzel, Steffen; Vrhovec, Simon ...
IEEE security & privacy,
2022-Jan.-Feb., 2022-1-00, Letnik:
20, Številka:
1
Magazine Article
Odprti dostop
Over the last few years, people have been reshaping their homes into smart hubs owing to a wide array of Internet of Things (IoT) devices, including interconnected lights, locks, sensors, cameras, ...actuators, wearables, and appliances accessible through the Internet that can be controlled locally via voice or remotely though mobile phones. As a consequence, modern smart homes are complex internetworks of laptops, mobile phones, game consoles, wearable equipment, and various consumer IoT nodes, which can be used for work, health, safety, and entertainment purposes. This transformation culminated in globalized homes that can be accessed from anywhere. Although the globalization process showcases many benefits, it also renders homes more insecure and less private places where individuals are exposed to an increasing variety of threats from the outside world.