Back to Results
First PageMeta Content
Computer network security / Crime prevention / National security / Malware / Spyware / Internet privacy / Phishing / Threat / Social networking service / Security / Cyberwarfare / Computer security


The Psychology of Security for the Home Computer User
Add to Reading List

Document Date: 2012-05-22 01:33:45


Open Document

File Size: 333,33 KB

Share Result on Facebook

Company

Gartner / Google / Facebook / Craigslist / Trend Micro / Symantec / /

Country

United States / Australia / United Kingdom / India / /

Currency

USD / /

/

Facility

Carnegie Mellon University / Camp et al. / University of South Australia / Northumbria University / /

IndustryTerm

Internet browser Scan computer / online risk / online / anti-virus software / hightech / Web password use / social networking sites / Online Behavior / randomized telephone calling / regular software / online experience / Web browsing / Web forums / suburban and high tech / anti-spyware software / specific technologies / Web browser / online identity / online activities / online threat / selected inferior software / home computer networks / perceived online threats / malicious software / Web risks / Web cookies / online service / online behaviors / Internet threats / online store / Online Safety Study / telephone survey / online behavior intentions / workplace equipment / online interactions / online shopping services / suburban and rural groups / online antivirus application / Internet use / educational software / mass media / social networking / telecommunications / security software usage / antivirus software sales / software download / specific Internet threats influence users / technology adoption / online forms / banking / Web security / computing / online shoppers / virus protection software / Internet service / software security installation / anti-virus software use / online safety behaviors / security software / careful downloading software / online survey / security solutions / antivirus software / /

MarketIndex

set 20 / /

NaturalFeature

Summer/Fall / /

OperatingSystem

Mac OS X / LINUX / Microsoft Windows / /

Organization

Psychology Division / University of South Australia / United States Computer Emergency Response Team Coordination Center / Colorado State University / Northumbria University / Carnegie Mellon University / /

Person

Lu / LaRose / Ryan West / Mark Roberts / Adele E. Howe / Indrajit Ray / /

Position

keystroke logger / Governor / model / extended TAM model / /

ProgrammingLanguage

R / C / /

ProvinceOrState

New Jersey / Maine / Prince Edward Island / Michigan / South Australia / California / /

Region

South Australia / /

Technology

home network / Linux / operating system / SSL / anti-virus software / encryption / specific technologies / ISP / antivirus software / simulation / /

URL

www.itsafe.gov.uk / www.getsafeonline.irg / www.internetsafetyzone.com / www.bbc.co.uk/webwise / /

SocialTag