Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 35 publications
0
7
0
1
Order By: Relevance
“…Previous research studied employees' security behaviour when using BYOD at work (e.g. Al Askar & Shen, 2016;Arpaci, 2019;Baillette et al, 2018;Bulgurcu, Cavusoglu, & Benbasat, 2010;de las Cuevas et al, 2015;Disterer & Kleiner, 2013;Hovav & Putri, 2016;Kerr, Talaei-Khoei, & Ghapanchi, 2018;Martens, De Wolf, & De Marez, 2019;Musarurwa, Flowerday, & Cilliers, 2017;Dang-Pham & Pittayachawan, 2015;Romer, 2014;Zahadat, Blessner, Ubene, Agim, & Umo-Odiong, 2015). However, there is a gap in the existing literature in terms of research accounting for gender differences in BYOD security behavioural intention in the workforce.…”
Section: Introductionmentioning
confidence: 99%
“…Previous research studied employees' security behaviour when using BYOD at work (e.g. Al Askar & Shen, 2016;Arpaci, 2019;Baillette et al, 2018;Bulgurcu, Cavusoglu, & Benbasat, 2010;de las Cuevas et al, 2015;Disterer & Kleiner, 2013;Hovav & Putri, 2016;Kerr, Talaei-Khoei, & Ghapanchi, 2018;Martens, De Wolf, & De Marez, 2019;Musarurwa, Flowerday, & Cilliers, 2017;Dang-Pham & Pittayachawan, 2015;Romer, 2014;Zahadat, Blessner, Ubene, Agim, & Umo-Odiong, 2015). However, there is a gap in the existing literature in terms of research accounting for gender differences in BYOD security behavioural intention in the workforce.…”
Section: Introductionmentioning
confidence: 99%
“…Especially when measuring cybersecurity, a rigid solution that does not adapt to a changing environment or a new use case is far from optimal [54]. It is not surprising to see, then, that adaptability is a key focus of many studies [13,55], although operationalisation of adaptability is still a challenge [53].…”
Section: Adaptabilitymentioning
confidence: 99%
“…José Manuel Sánchez-García y Purificación Toledo-Morales. Página 9 de 15 el uso de software, la utilidad de los programas educativos, el abaratamiento de costes y la sencillez de manejo de los dispositivos; y los riesgos que presenta el uso de un sistema informático complejo, la aparición de virus y malware, la perdida de datos, el acoso en las redes sociales, el miedo de los docentes a aceptar el cambio o la pérdida de autoridad del profesor frente a las redes (De las Cuevas, Mora, Merelo, Castillo, García-Sánchez & Fernández-Ares, 2015;D'Arcy, 2011;Niehaves, Ortbach & Koeffer, 2012;Flumerfelt & Green, 2013;Leclercq-Vandelannoitte, 2015;Vignesh & Asha, 2015). Es necesario buscar formas de implantación y uso que en el ámbito educativo han de primar la formación de los alumnos, el uso de las redes para obtener información, el uso de esta información y su influencia en los diferentes aspectos del proceso de enseñanza aprendizaje.…”
Section: Seguridad Y Accesibilidad Retos Para Una Implantación Tecnounclassified