126 related articles for article (PubMed ID: 28297719)
1. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.
Alsaleh M; Alomar N; Alarifi A
PLoS One; 2017; 12(3):e0173284. PubMed ID: 28297719
[TBL] [Abstract][Full Text] [Related]
2. Who Is Smart with Their Smartphones? Determinants of Smartphone Security Behavior.
Knapova L; Kruzikova A; Dedkova L; Smahel D
Cyberpsychol Behav Soc Netw; 2021 Sep; 24(9):584-592. PubMed ID: 34152852
[TBL] [Abstract][Full Text] [Related]
3. The current state and future of mobile security in the light of the recent mobile security threat reports.
Cinar AC; Kara TB
Multimed Tools Appl; 2023; 82(13):20269-20281. PubMed ID: 36743997
[TBL] [Abstract][Full Text] [Related]
4. Predicting personality from patterns of behavior collected with smartphones.
Stachl C; Au Q; Schoedel R; Gosling SD; Harari GM; Buschek D; Völkel ST; Schuwerk T; Oldemeier M; Ullmann T; Hussmann H; Bischl B; Bühner M
Proc Natl Acad Sci U S A; 2020 Jul; 117(30):17680-17687. PubMed ID: 32665436
[TBL] [Abstract][Full Text] [Related]
5. Data modeling positive security behavior implementation among smart device users in Indonesia: A partial least squares structural equation modeling approach (PLS-SEM).
Kautsarina ; Hidayanto AN; Anggorojati B; Abidin Z; Phusavat K
Data Brief; 2020 Jun; 30():105588. PubMed ID: 32382604
[TBL] [Abstract][Full Text] [Related]
6. Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage.
Zhou G; Gou M; Gan Y; Schwarzer R
Front Psychol; 2020; 11():1066. PubMed ID: 32595556
[TBL] [Abstract][Full Text] [Related]
7. Barriers to and Facilitators of the Use of Mobile Health Apps From a Security Perspective: Mixed-Methods Study.
Zhou L; Bao J; Watzlaf V; Parmanto B
JMIR Mhealth Uhealth; 2019 Apr; 7(4):e11223. PubMed ID: 30990458
[TBL] [Abstract][Full Text] [Related]
8. Smartphone technology for communications between clinicians - A scoping review.
John B; McCreary C; Roberts A
J Dent; 2022 Jul; 122():104112. PubMed ID: 35413411
[TBL] [Abstract][Full Text] [Related]
9. Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review.
Shuwandy ML; Zaidan BB; Zaidan AA; Albahri AS
J Med Syst; 2019 Jan; 43(2):33. PubMed ID: 30612191
[TBL] [Abstract][Full Text] [Related]
10.
Hughes Driscoll CA; Jahrsdoerfer M; Easter L; El-Metwally D
Biomed Instrum Technol; 2020 Jan./Feb.; 54(1):22-27. PubMed ID: 31961735
[TBL] [Abstract][Full Text] [Related]
11. Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Cui Y; Gao F; Li W; Shi Y; Zhang H; Wen Q; Panaousis E
Sensors (Basel); 2020 Aug; 20(16):. PubMed ID: 32824808
[TBL] [Abstract][Full Text] [Related]
12. Users' Responsiveness to Persuasive Techniques in Recommender Systems.
Alslaity A; Tran T
Front Artif Intell; 2021; 4():679459. PubMed ID: 34308340
[TBL] [Abstract][Full Text] [Related]
13. Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Levshun D; Chechulin A; Kotenko I
Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808558
[TBL] [Abstract][Full Text] [Related]
14. Do Smartphone Power Users Protect Mobile Privacy Better than Nonpower Users? Exploring Power Usage as a Factor in Mobile Privacy Protection and Disclosure.
Kang H; Shin W
Cyberpsychol Behav Soc Netw; 2016 Mar; 19(3):179-85. PubMed ID: 26783875
[TBL] [Abstract][Full Text] [Related]
15. The Role of Data Type and Recipient in Individuals' Perspectives on Sharing Passively Collected Smartphone Data for Mental Health: Cross-Sectional Questionnaire Study.
Nicholas J; Shilton K; Schueller SM; Gray EL; Kwasny MJ; Mohr DC
JMIR Mhealth Uhealth; 2019 Apr; 7(4):e12578. PubMed ID: 30950799
[TBL] [Abstract][Full Text] [Related]
16. ISBP: Understanding the Security Rule of Users' Information-Sharing Behaviors in Partnership.
Wu H; Wang X
PLoS One; 2016; 11(3):e0151002. PubMed ID: 26950064
[TBL] [Abstract][Full Text] [Related]
17. Exposure to urban and rural contexts shapes smartphone usage behavior.
Sapienza A; Lítlá M; Lehmann S; Alessandretti L
PNAS Nexus; 2023 Nov; 2(11):pgad357. PubMed ID: 38034094
[TBL] [Abstract][Full Text] [Related]
18. Risk analysis of information security in a mobile instant messaging and presence system for healthcare.
Bønes E; Hasvold P; Henriksen E; Strandenaes T
Int J Med Inform; 2007 Sep; 76(9):677-87. PubMed ID: 16931132
[TBL] [Abstract][Full Text] [Related]
19. Social Q&A communities: A multi-factor study of the influence of users' knowledge sharing behaviors.
Wen Y; Yuan X; Li W
Front Psychol; 2022; 13():967991. PubMed ID: 36248510
[TBL] [Abstract][Full Text] [Related]
20. A rhythm-based authentication scheme for smart media devices.
Lee JD; Jeong YS; Park JH
ScientificWorldJournal; 2014; 2014():781014. PubMed ID: 25110743
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]