The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2018
DOI: 10.1080/08874417.2018.1490157
|View full text |Cite
|
Sign up to set email alerts
|

Free Wi-Fi: To Buy or Not to Buy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 67 publications
0
7
0
Order By: Relevance
“…Infrastructure trust emphasizes the trust people have in a channel used to access the internet located primarily through connections at home, work, public Wi-Fi and/or their mobile network provider (Lee et al , 2016; Mahadevan and Kaleta, 2018). To build a person’s trust, an internet channel should have all the functionality to overcome issues specific to its technology infrastructure and environment.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Infrastructure trust emphasizes the trust people have in a channel used to access the internet located primarily through connections at home, work, public Wi-Fi and/or their mobile network provider (Lee et al , 2016; Mahadevan and Kaleta, 2018). To build a person’s trust, an internet channel should have all the functionality to overcome issues specific to its technology infrastructure and environment.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…The internet is everywhere and accessible primarily from four channels, home, work, public Wi-Fi and cellular data (mobile networks) (Lee et al , 2016; Mahadevan and Kaleta, 2018). Access to the internet has been increasing at a remarkable pace with almost 110 million US households having fixed broadband internet access in 2017, up from approximately 80 million in 2009 (Statista, 2018c).…”
Section: Introductionmentioning
confidence: 99%
“…Users possibly prefer to conserve a data quota or not enough data volume is left at the moment they need to access geospatial information. Lastly, although ever-growing Wi-Fi hotspots are deployed [21], looking for openly accessible ones is still no easy task, even in metropolitan areas [22]. Most discoverable access points are password-protected, and some enforce an authentication or registration via portals.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile devices are also preferred for usage in education (Joyce-Gibbons et al, 2018;Suryasa et al, 2020) and for communication and e-commerce (Einav et al, 2014) due to the information they store (Bitton et al, 2018) and their ease of use, portability, and reliable functions. In addition, most mobile phone users opt for wireless networks to access the Internet (Mahadevan & Kaleta, 2018). As a result, the use of wireless networks is exponentially growing (Cisco, 2020).…”
mentioning
confidence: 99%
“…One possible attack on wireless communications is the spoofing attack, sometimes referred to as KARMA (Jindal et al, 2014), rogue access point (RAP), evil twin attack (ETA) (Rech, 2012), or network spoofing attack (Mahadevan & Kaleta, 2018). Spoofing attacks on the internet work in an environment where information is transmitted between network users who are identified by Internet addresses.…”
mentioning
confidence: 99%