메뉴 건너뛰기




Volumn , Issue , 2013, Pages 737-744

A pilot study of cyber security and privacy related behavior and personality traits

Author keywords

Facebook; Personality traits; Phishing; Privacy

Indexed keywords

BEHAVIORAL RESEARCH; COMPUTER CRIME; CYBERSECURITY; RISK PERCEPTION; SOCIAL NETWORKING (ONLINE); USER INTERFACES;

EID: 84893129956     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2487788.2488034     Document Type: Conference Paper
Times cited : (119)

References (33)
  • 3
    • 0040095571 scopus 로고    scopus 로고
    • The relation between learning styles, the big five personality traits and achievement motivation in higher education
    • V. V. Busato, F. J. Prins, J. J. Elshout, and C. Hamaker. The relation between learning styles, the Big Five personality traits and achievement motivation in higher education. Personality and Individual Differences, 26:129 - 140, 1999.
    • (1999) Personality and Individual Differences , vol.26 , pp. 129-140
    • Busato, V.V.1    Prins, F.J.2    Elshout, J.J.3    Hamaker, C.4
  • 9
    • 70450206356 scopus 로고    scopus 로고
    • Facebook and online privacy: Attitudes, behaviors, and unintended consequences
    • B. Debatin1, J. P. Lovejoy, A.-K. H. M.A., and B. N. Hughes. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication, 15:83-108, 10 2009.
    • (2009) Journal of Computer-Mediated Communication , vol.15 , Issue.10 , pp. 83-108
    • Debatin, B.1    Lovejoy, J.P.2    Hughes, B.N.3
  • 13
    • 70449567103 scopus 로고    scopus 로고
    • Designing and conducting phishing experiments
    • Special Issue on Usability and Security
    • P. Finn and M. Jakobsson. Designing and Conducting Phishing Experiments. IEEE Technology and Society Magazine, Special Issue on Usability and Security, 2007.
    • (2007) IEEE Technology and Society Magazine
    • Finn, P.1    Jakobsson, M.2
  • 14
    • 80054834326 scopus 로고    scopus 로고
    • Manifestations of personality in online social networks: Self-reported facebook-related behaviors and observable profile information
    • S. D. Gosling, A. A. Augustine, S. Vazire, N. Holtzman, and S. Gaddis. Manifestations of Personality in Online Social Networks: Self-Reported Facebook-Related Behaviors and Observable Profile Information. Cyberpsychology, Behavior, and Social Networking, 14:483-488, 9 2011.
    • (2011) Cyberpsychology, Behavior, and Social Networking , vol.14 , Issue.9 , pp. 483-488
    • Gosling, S.D.1    Augustine, A.A.2    Vazire, S.3    Holtzman, N.4    Gaddis, S.5
  • 16
    • 0034227818 scopus 로고    scopus 로고
    • The relationship between extraversion and neuroticism and the different uses of the internet
    • July
    • Y. A. Hamburger and E. Ben-Artzi. The relationship between extraversion and neuroticism and the different uses of the Internet. Computers in Human Behavior, 16(4):441-449, July 2000.
    • (2000) Computers in Human Behavior , vol.16 , Issue.4 , pp. 441-449
    • Hamburger, Y.A.1    Ben-Artzi, E.2
  • 19
    • 84860427472 scopus 로고    scopus 로고
    • Personality traits, usage patterns and information disclosure in online communities
    • September
    • C. K. Johann Schrammel and M. Tschelig. Personality Traits, Usage Patterns and Information Disclosure in Online Communities. Proceedings of HCI, September 2009.
    • (2009) Proceedings of HCI
    • Schrammel, C.K.J.1    Tschelig, M.2
  • 20
    • 44049118577 scopus 로고
    • Four ways five factors are basic
    • June
    • P. T. C. Jr and R. R. McCrae. Four ways five factors are basic. Personality and Individual Differences, 13(6):653-665, June 1992.
    • (1992) Personality and Individual Differences , vol.13 , Issue.6 , pp. 653-665
    • McCrae, R.R.1
  • 21
    • 0000125532 scopus 로고
    • Prospect theory: An analysis of decision under risk
    • March
    • D. Kahneman and A. Tversky. Prospect Theory: An Analysis of Decision under Risk. Econometrica, March 1979.
    • (1979) Econometrica
    • Kahneman, D.1    Tversky, A.2
  • 25
    • 0026874067 scopus 로고
    • An introduction to the five-factor model and its applications
    • June
    • R. R. McCrae1 and O. P. John. An Introduction to the Five-Factor Model and Its Applications. Journal of Personality, 60(2):175-215, June 1992.
    • (1992) Journal of Personality , vol.60 , Issue.2 , pp. 175-215
    • Mccrae, R.R.1    John, O.P.2
  • 26
    • 84893098001 scopus 로고    scopus 로고
    • How neurotic are scam victims, really? the big five and internet scams
    • D. Modic1 and S. E. Lea1. How neurotic are scam victims, really? The big five and Internet scams. Security and Human Behavior, 2012.
    • (2012) Security and Human Behavior
    • Modic, D.1    Lea, S.E.2
  • 27
    • 84893085125 scopus 로고    scopus 로고
    • Online privacy threats: A review and analysis of current threats
    • C. I. Policy and P. I. Clinic. Online privacy threats: a review and analysis of current threats. http://www.cippic.ca/sites/default/files/ publications/CIPPIC-Online-Privacy-Threats-Final.pdf, 2008.
    • (2008) C. I. Policy and P. I. Clinic
  • 29
    • 84871246049 scopus 로고    scopus 로고
    • The big five personality dimensions and job performance
    • S. Rothmann and E. P. Coetzer. The Big Five Personality Dimensions and Job Performance. Journal of Industrial Psychology, 29(1):68 - 74, 2003.
    • (2003) Journal of Industrial Psychology , vol.29 , Issue.1 , pp. 68-74
    • Rothmann, S.1    Coetzer, E.P.2
  • 32
    • 11344278924 scopus 로고    scopus 로고
    • Five factor model of personality disorder: Integrating science and practice
    • February
    • T. A. Widiger. Five factor model of personality disorder: Integrating science and practice. Journal of Research in Personality, 39(1):67-83, February 2006.
    • (2006) Journal of Research in Personality , vol.39 , Issue.1 , pp. 67-83
    • Widiger, T.A.1
  • 33
    • 3042869109 scopus 로고    scopus 로고
    • Internet addiction: The emergence of a new clinical disorder
    • K. S. Young. Internet Addiction: The emergence of a new clinical disorder. CyberPsychology and Behavior, 1(3):237-244, 1996.
    • (1996) CyberPsychology and Behavior , vol.1 , Issue.3 , pp. 237-244
    • Young, K.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.