Data security incidents have led to a wave of security aware- ness campaigns by public institutions targeted towards the so-called home user. Despite this rise, studies have shown poor adoption rates of security measures by the target. In this paper, we conduct a quali- tative investigation of 15 home users, analyse the data using Grounded Theory and present a model of factors of data security decisions made in the home. We further consolidate the literature on this topic and analyse our findings against it using meta-synthesis. From this we identify the critical issues that surround data security in the home environment. We finally present a consolidated theoretical model for investigating factors that influence security practices in the h...
Smart home devices form a significant part of the consumer IoT market yet they have potential securi...
Home users have become the most attractive target for cyber criminals as they are more vulnerable an...
Home users are particularly vulnerable to information security threats as they must make decisions a...
Data security incidents have led to a wave of security aware- ness campaigns by public institutions ...
The most common solution to securing data in the home remains increased awareness. However, studies ...
The widespread and rising adoption of information and communication technology in homes is happening...
Abstract—The home computer user is often said to be the weakest link in computer security. They do n...
Cybersecurity has been a concern for businesses and governments since their initial uptake of the In...
The number of home computer users is increasing faster than ever. Home users ’ security should be an...
The continued rise in the number of managed and unmanaged devices connected to home networks has exp...
Home computer users play a crucial role in securing the cyberspace, but the protection of home compu...
© 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they...
People interact daily with IT systems and communication over the Internet has become an important pa...
Although firms are expending substantial resources to develop technology and processes that can help...
Home computer users are solely responsible for implementing security measures on their devices. Alth...
Smart home devices form a significant part of the consumer IoT market yet they have potential securi...
Home users have become the most attractive target for cyber criminals as they are more vulnerable an...
Home users are particularly vulnerable to information security threats as they must make decisions a...
Data security incidents have led to a wave of security aware- ness campaigns by public institutions ...
The most common solution to securing data in the home remains increased awareness. However, studies ...
The widespread and rising adoption of information and communication technology in homes is happening...
Abstract—The home computer user is often said to be the weakest link in computer security. They do n...
Cybersecurity has been a concern for businesses and governments since their initial uptake of the In...
The number of home computer users is increasing faster than ever. Home users ’ security should be an...
The continued rise in the number of managed and unmanaged devices connected to home networks has exp...
Home computer users play a crucial role in securing the cyberspace, but the protection of home compu...
© 2017 Elsevier Ltd Personal computing users are vulnerable to information security threats, as they...
People interact daily with IT systems and communication over the Internet has become an important pa...
Although firms are expending substantial resources to develop technology and processes that can help...
Home computer users are solely responsible for implementing security measures on their devices. Alth...
Smart home devices form a significant part of the consumer IoT market yet they have potential securi...
Home users have become the most attractive target for cyber criminals as they are more vulnerable an...
Home users are particularly vulnerable to information security threats as they must make decisions a...