{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:43Z","timestamp":1740099103760,"version":"3.37.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788159"},{"type":"electronic","value":"9783319788166"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78816-6_13","type":"book-chapter","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T23:02:48Z","timestamp":1524524568000},"page":"166-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2447-3246","authenticated-orcid":false,"given":"Ken","family":"Eustace","sequence":"first","affiliation":[]},{"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"Geoff","family":"Fellows","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"unstructured":"Australia\u2019s Cyber Security Strategy. https:\/\/cybersecuritystrategy.dpmc.gov.au\/assets\/img\/PMC-Cyber-Strategy.pdf","key":"13_CR1"},{"key":"13_CR2","volume-title":"Information Technology for Management: Digital Strategies for Insight, Action and Sustainable Performance","author":"E Turban","year":"2015","unstructured":"Turban, E., Volonino, L., Wood, G.R.: Information Technology for Management: Digital Strategies for Insight, Action and Sustainable Performance. Wiley, Hoboken (2015)"},{"unstructured":"Prieto, R.: Cisco VNI Predicts Near-Tripling of IP Traffic. https:\/\/newsroom.cisco.com\/press-release-content?type=webcontent&articleId=1771211","key":"13_CR3"},{"unstructured":"Wilkinson, M.: Cyber Security Challenges facing Australia in the Asian-Pacific Region. http:\/\/thinkspace.csu.edu.au\/itc571securitychallengesinapac\/","key":"13_CR4"},{"issue":"9","key":"13_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/2629612","volume":"57","author":"M Tsikerdekis","year":"2014","unstructured":"Tsikerdekis, M., Zeadally, S.: Online deception in social media. Commun. ACM 57(9), 72\u201380 (2014)","journal-title":"Commun. ACM"},{"unstructured":"Eustace, K., Burmeister, O.: Ethics and governance of ICT-based social engagement in institutional aged care. In: Seventh Australian Institute of Computer Ethics Conference (AiCE) (2013)","key":"13_CR6"},{"unstructured":"Harvie, G., Burmeister, O., Eustace, K.: Bringing the oldest-old into the digital age: overcoming challenges of mobility, literacy and learning. In: 13th National Conference of Emerging Researchers in Ageing. http:\/\/www.era.edu.au\/ERA+2014","key":"13_CR7"},{"key":"13_CR8","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-44805-3_3","volume-title":"Technology and Intimacy: Choice or Coercion","author":"G Harvie","year":"2016","unstructured":"Harvie, G., Eustace, K., Burmeister, O.K.: Assistive technology devices for the oldest-old: maintaining independence for the fourth age. In: Kreps, D., Fletcher, G., Griffiths, M. (eds.) HCC 2016. IAICT, vol. 474, pp. 25\u201333. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44805-3_3"},{"unstructured":"Phahlamohlaka, J.: Defence, peace, safety, security and information warfare research, In: SCM Seminar Series. Charles Sturt University, Wagga Wagga, NSW, Australia (2012)","key":"13_CR9"},{"unstructured":"Connolly, C., Maurushat, A., Vaile, D., van Dijk, P.: An overview of international cyber-security awareness raising and educational initiatives. In: International Cyber-Security Awareness, Sydney (2011). Site: acma.gov.au","key":"13_CR10"},{"key":"13_CR11","volume-title":"Computer Security: Principles and Practice","author":"W Stallings","year":"2012","unstructured":"Stallings, W., Brown, L.: Computer Security: Principles and Practice. Pearson, Upper Saddle River (2012)"},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.giq.2017.02.007","volume":"34","author":"H Bruijn De","year":"2017","unstructured":"De Bruijn, H., Janssen, M.: Building cybersecurity awareness: the need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1\u20137 (2017)","journal-title":"Gov. Inf. Q."},{"unstructured":"Stammberger, K.: Mobile & Smart Device Security Survey 2010: Concern Grows as Vulnerable Devices Proliferate, Smartphones are the Tip of the Iceberg. Mocana Corporation (2010)","key":"13_CR13"},{"unstructured":"U.S. Department of Homeland Security: Technical Information Paper-TIP-10-105-01 Cyber Threats to Mobile Devices, Washington (2010)","key":"13_CR14"},{"unstructured":"Nickinson, P.: Android market now has more than a quarter-million applications (2011). http:\/\/www.androidcentral.com\/android-market-now-has-more-quarter-million-applications","key":"13_CR15"},{"unstructured":"Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: 20th USENIX Security Symposium (2011)","key":"13_CR16"},{"unstructured":"Vidas, T., Votipka, D., Christin, N.: All your droids are belong to us: a survey of current android attacks. In: Proceedings of the 5th USENIX Conference on Offensive Technologies. USENIX Association, Berkeley (2011)","key":"13_CR17"},{"unstructured":"Felt, A.P., Wang, H.J., Moschuk, A., Hanna, S., Chin, E.: Permission re-delegation: attacks and defenses. In: 20th USENIX Security Symposium (2011)","key":"13_CR18"},{"doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behaviour, Electrical Engineering and Computer Sciences, University of California at Berkeley (2012)","key":"13_CR19","DOI":"10.1145\/2335356.2335360"},{"unstructured":"Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P.: TaintDroid: an information-flow tracking system for realtime privacy. In: 9th USENIX Symposium on Operating Systems Design and Implementation (2010)","key":"13_CR20"},{"issue":"1","key":"13_CR21","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1504\/IJIL.2011.041226","volume":"10","author":"P Tsang","year":"2011","unstructured":"Tsang, P., Kwok, P., Kwong, R., White, B., Fox, R.: Innovation in ICT teaching: a longitudinal case study of Wi-Fi in Hong Kong. Int. J. Innov. Learn. 10(1), 85\u2013101 (2011)","journal-title":"Int. J. Innov. Learn."},{"unstructured":"Tsang, P., Eustace, K.: Educational and social implications from a longitudinal Wi-Fi security study (2002\u20132014). In: Proceedings of the International Conference on Information Technologies, InfoTech 2014, Bulgaria (2014)","key":"13_CR22"},{"doi-asserted-by":"crossref","unstructured":"Fong, K., Wong, S.: Hong Kong Wi-Fi adoption and security survey 2014. Comput. Inf. Sci. 8(1) (2015)","key":"13_CR23","DOI":"10.5539\/cis.v8n1p74"},{"unstructured":"Symantec: 2015 Internet Security Threat Report. https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/ISTR\/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf","key":"13_CR24"},{"unstructured":"Fellows, G., McAfee, M., Eustace, K.: The role of human factors in the ICT security of large social systems, Las Vegas USA (2013, Unpublished paper)","key":"13_CR25"},{"unstructured":"Shoichet, C.E.: Is Snowden worth the risk? Latin America weighs pros and cons. http:\/\/www.cnn.com\/2013\/07\/11\/world\/americas\/latin-america-snowden-asylum","key":"13_CR26"},{"unstructured":"Warren, M.: Keynote Address, ICT Higher Degree Research Symposium 2016. Charles Sturt University. https:\/\/www.asd.gov.au\/infosec\/mitigationstrategies.htm","key":"13_CR27"},{"unstructured":"Feakin, T., Woodall, J., Nevill, L.: Cyber maturity in the Asia-Pacific Region 2015. ASPI. https:\/\/www.aspi.org.au\/publications\/cyber-maturity-in-the-asia-pacific-region-2015\/Cyber-Maturity-2015.pdf","key":"13_CR28"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78816-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T18:46:35Z","timestamp":1571251595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78816-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788159","9783319788166"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78816-6_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}