• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
For: Grobler M, Gaire R, Nepal S. User, Usage and Usability: Redefining Human Centric Cyber Security. Front Big Data 2021;4:583723. [PMID: 33748750 PMCID: PMC7968726 DOI: 10.3389/fdata.2021.583723] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/15/2020] [Accepted: 01/20/2021] [Indexed: 11/13/2022]  Open
Number Cited by Other Article(s)
1
Malik AS, Acharya S, Humane S. Exploring the Impact of Security Technologies on Mental Health: A Comprehensive Review. Cureus 2024;16:e53664. [PMID: 38455776 PMCID: PMC10918303 DOI: 10.7759/cureus.53664] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/30/2023] [Accepted: 02/03/2024] [Indexed: 03/09/2024]  Open
2
Jeyaraman M, Balaji S, Jeyaraman N, Yadav S. Unraveling the Ethical Enigma: Artificial Intelligence in Healthcare. Cureus 2023;15:e43262. [PMID: 37692617 PMCID: PMC10492220 DOI: 10.7759/cureus.43262] [Citation(s) in RCA: 8] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 08/10/2023] [Indexed: 09/12/2023]  Open
3
Sharma V. Functional Security and Trust in Ultra-Connected 6G Ecosystem. EAI Endorsed Trans Ind Net Intel Syst 2022. [DOI: 10.4108/eetinis.v9i4.2846] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]  Open
4
Hilowle M, Yeoh W, Grobler M, Pye G, Jiang F. Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review. Journal of Computer Information Systems 2022. [DOI: 10.1080/08874417.2022.2140089] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
5
Collen A, Szanto I, Benyahya M, Genge B, Nijdam NA. Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment. Information 2022;13:340. [DOI: 10.3390/info13070340] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
6
Damaševičius R, Zailskaitė-jakštė L. Usability and Security Testing of Online Links: A Framework for Click-Through Rate Prediction Using Deep Learning. Electronics 2022;11:400. [DOI: 10.3390/electronics11030400] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/10/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA