Cyber Security Education Initiative

Research Output 2009 2018

  • 8 Article
  • 7 Conference contribution
  • 1 Review article
Filter
Article
2018
11 Citations (Scopus)

A bidirectional perspective of trust and risk in determining factors that influence mobile app installation

Chin, A. G., Harris, M. A. & Brookshire, R., Apr 2018, In : International Journal of Information Management. 39, p. 49-59 11 p.

Research output: Contribution to journalArticle

Application programs
loyalty
privacy
2016
1 Citation (Scopus)

Consumer trust in Google's top developers' apps: An exploratory study

Harris, M. A. & Chin, A. G., Jan 1 2016, In : Information and Computer Security. 24, 5, p. 474-495 22 p.

Research output: Contribution to journalArticle

Application programs
Google
Exploratory study
Developer
Consumer trust
38 Citations (Scopus)

Identifying factors influencing consumers' intent to install mobile applications

Harris, M. A., Brookshire, R. & Chin, A. G., Jun 1 2016, In : International Journal of Information Management. 36, 3, p. 441-450 10 p.

Research output: Contribution to journalArticle

disposition
Purchasing
psychotherapy
Application programs
reputation
4 Citations (Scopus)

On mobile device security practices and training efficacy: An empirical study

Goyal Chin, A., Etudo, U. & Harris, M. A., Jan 1 2016, In : Informatics in Education. 15, 2, p. 235-252 18 p.

Research output: Contribution to journalArticle

Mobile devices
Students
training program
Electronic mail
Application programs
2015
11 Citations (Scopus)

Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum

Harris, M. A. & Patten, K. P., Jan 1 2015, In : Journal of Information Systems Education. 26, 3, p. 219-234 16 p.

Research output: Contribution to journalArticle

Taxonomies
taxonomy
Curricula
curriculum
Accreditation
2013
17 Citations (Scopus)

The need to address mobile device security in the higher education IT curriculum

Patten, K. P. & Harris, M. A., Jan 1 2013, In : Journal of Information Systems Education. 24, 1, p. 41-52 12 p.

Research output: Contribution to journalArticle

Mobile devices
Curricula
Education
curriculum
education
2012
10 Citations (Scopus)

Routes to security compliance: Be good or be shamed?

Harris, M. & Furnell, S., Dec 1 2012, In : Computer Fraud and Security. 2012, 12, p. 12-20 9 p.

Research output: Contribution to journalArticle

Security of data
Managers
Personnel
staff
responsibility
2011

A privacy agreement negotiation model in B2C e-commerce transactions

Rallapalli, M. V., Jan 1 2011, In : International Journal of Information Security and Privacy. 5, 4, p. 1-7 7 p.

Research output: Contribution to journalArticle

Web services