- Information and Cyber Security
- Cybersecurity and Cyber Warfare Studies
- Social Media and Politics
- Technology Use by Older Adults
- Cybercrime and Law Enforcement Studies
- ICT Impact and Policies
- Impact of Technology on Adolescents
- Sharing Economy and Platforms
- E-Government and Public Services
- Retirement, Disability, and Employment
- Bullying, Victimization, and Aggression
- Privacy, Security, and Data Protection
- Hate Speech and Cyberbullying Detection
- Spam and Phishing Detection
- Migration and Labor Dynamics
- Social and Intergroup Psychology
- Digital Economy and Work Transformation
- Urban, Neighborhood, and Segregation Studies
- Opinion Dynamics and Social Influence
- Government, Law, and Information Management
- Innovative Approaches in Technology and Social Development
- Border Security and International Relations
- Child Development and Digital Technology
- Social Capital and Networks
- Crime, Illicit Activities, and Governance
Michigan State University
2014-2022
This study examines how older adults learn to use tablet computers. Learning new technologies can help be included in today's digital society. However, learning is not always easy, especially for adults. focuses on a specific technology, computers, and the role that social support plays this process. Data project are from 21 in-depth interviews with individuals who own We examine engage devices increase their literacy. The findings suggest that, start tablets, an important role. In addition,...
Using information and communication technologies (ICTs) can improve older adults' quality of life. ICT use is associated with decreased feelings loneliness depression, along increased independence personal growth. However, limited access low technological self-efficacy are key reasons why some groups, especially adults, excluded from being fully engaged in the digital world. In this study, we focus on self-efficacy, which related to their actual technology second level divide. Specifically,...
The growing centrality of cybersecurity has led many governments and international organisations to focus on building the capacity nations withstand threats public its digital resources. These initiatives entail a range actions that vary from education training technology related standards, as well new legal policy frameworks. While efforts proactively address security problems seem intuitively valuable, they are new, meaning there is relatively little research whether achieve their intended...
ABSTRACTThe purpose of this study is to examine the process from technology exploration acceptance for older adults. A senior exploration, learning, and (STELA) model pr...
Abstract National cybersecurity capacity building involves the development of managerial, technical, social, legal, policy, and regulatory initiatives by a growing ecology actors to enhance resilience nations breaches, cybercrime, terrorism. Capacity is therefore resource intensive, requiring attention across sectors society, ranging from governments Internet users. However, it difficult justify commitments when benefits national are largely based on logical reasoning, limited case studies,...
Though online banking has become more pervasive in U.S. society, little research examined how different generational cohorts perceive and use banking. This study examines differences perceptions intentions across three the U.S.: Silent G.I. generation (SGI) (born 1945 or earlier), older Boomers (1946–1954), Millennials (1977–1992). Guided by Technology Acceptance Model Protection Motivation Theory, it tests a model that identifies factors influence each generation's acceptance of An survey...
China is continuing to witness rising numbers of migrants (e.g., individuals migrating from rural urban areas), and alongside this are the social restrictions institutional barriers face. Such a consequence long-standing urban-rural dualist system can create sense relative deprivation among migrants—that is, dissatisfaction when perceive they at disadvantage compared with local residents an area. Based on Pierre Bourdieu's field theory, current study used data 2017 Chinese General Social...
Web defacement is a form of hacking that involves altering the content website, resulting in repairs to website code, loss revenue, internal productivity, and reputational damage. Limited research has examined frequency web defacements, factors distinguish them from other motives, extent which correlates mirror on physical acts ideologically-motivated crime. The current study over 2.4 million defacements hosted U.S. 2012 2016 assess aspects routine activities theory associated with target...
Social scientists have long been interested in the motives of hackers, particularly financially motivated attackers. This article analyzes web defacements, a less studied and more public form cyberattack, which content page is deliberately substituted with unwanted text graphics chosen by perpetrator. These attacks use variety strategies are performed for motives, including political ideological goals. The proliferation such has resulted vast amounts data that open new opportunities...
This paper draws from empirical research on Internet users to identify the elements that accompany/define a cybersecurity mindset, and factors likely support its acquisition. Based survey of online workers, we found pattern beliefs in efficacy personal safer computing efforts, such as using firewalls, protective software strong passwords, be closely related what sources information rely for cybersecurity. Survey questions tapped degree viewed various providing comprehensive about...
It is assumed that the benefits of building national cyber security capacity are widespread, largely based on common sense, limited case studies, anecdotal evidence, and expert opinion. This paper reports early phase a systematic effort to bring together cross-national data from multiple sources examine indicators related nation. We use these determine if matters – does it translate into conditions affecting end users Internet. Using approximately 120 countries, multivariate analysis shown...
Technological changes bring great efficiencies and opportunities; however, they also new threats dangers that users are often ill prepared to handle. Some individuals have training at work or school while others family friends help them. However, there few widely known ubiquitous educational programs inform motivate develop safe cybersecurity practices. Additionally, little is about learning strategies in this domain. Understanding how active Internet learned their security practices can...
Internet users face threats of increasing complexity and severity. To protect themselves they rely on sources for online safety information. These may either build up, or undermine, the coping self-efficacy motivation needed to oneself. A survey 800 subjects asked about which relied information safety: media, work, school, friends family, specialized web sites. Individuals who said had no comprehensive source reported lowest levels both (b= -0.609, p< 0.001) protection habit strength -0.900,...
The main purpose of this study is to examine how older adults learn use tablet computers. Learning new technologies (especially information and communication technologies, such as computers, tablets, mobile phones) can help be included in digital society. However, learning not always easy, especially for adults. This focuses on a specific type ICT the role that social support plays process Data project are from 21 in-depth interviews with individuals who report owning We engage build up...
The growing centrality of cyber-security has led many governments and international organizations to focus on building the capacity nations withstand threats online security public its digital resources. These initiatives entail a range actions that vary from education training, technology related standards, as well new legal policy frameworks. While efforts proactively address problems are intuitively valuable, there is lack evidence whether they achieve their intended objectives. This...
Research has noted a link between social media use and political participation. Scholars have also identified need to explain this link. The present study is theoretical empirical probe into the outcomes of unfriending people on media. Drawing privacy management theory identity perspective, it explores relationship network curation (blocking or others for reasons), perceived agreeability (how often agree with opinions content friends media), forms Using data from survey US adults (N=2,018)...
Abstract National cybersecurity capacity building involves the development of managerial, technical, social, legal, policy, and regulatory initiatives by a growing ecology actors to enhance resilience nations breaches, cybercrime, terrorism. Capacity is therefore resource intensive, requiring attention across sectors society, ranging from governments Internet users. However, it difficult justify commitments when benefits national are largely based on logical reasoning, limited case studies,...