7 research outputs found

    A Review on Cognitive Neuroscience in Information Security Behavior

    Get PDF
    NeuroIS is a hot topic of research in recent years, and cognitive neuroscience has found a new way to explain the underlying causes of human behavior in the field of information security research. By searching the research status of cognitive neuroscience in information security behavior research, we found that the number is gradually increasing, and the most frequently used neurocognitive tools are fMRI, EEG and eye tracking. Then a brief description of the application of each tool. Through combing the existing literature, it is found that cognitive neuroscience has become an important research subdomains in the information security behavior, and the research context has been clarified, which has provided guidance for subsequent research

    How to Advertise? Role of Congruence and Involvement on Multiscreen Consumption

    Get PDF
    It has become increasingly common for consumers to use additional devices while watching TV, a phenomenon called multiscreen viewing. This provides an additional advertising channel for marketers, specifically the second screen. However, it is not without its complexities; marketers must optimally time advertisements on the second screen conditional on the primary screen activity. Using a behavioral experiment this study proposes to investigate how consumers’ engagement and psychological involvement with the program on the primary screen affects their multiscreen behavior and its effect on brand recall. We further expect this relationship to be moderated by the congruence of the advertisement relative to the primary screen. Results of the study will not only contribute to the second screen literature in marketing and Information systems, but also help marketers develop actionable strategies for the second screen in multiscreen viewing contexts

    Length of Cloud Application Use on Functionality Expectation, Usability, Privacy, and Security: A Case of Google Docs

    Get PDF
    Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions: Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users. Available at: https://aisel.aisnet.org/pajais/vol11/iss3/2

    Length Of Cloud Application Use On Functionality Expectation, Usability, Privacy, And Security: A Case Of Google Docs

    Get PDF
    Background: Newcomers to cloud applications typically have to overcome concerns of privacy (confidentiality control) and security (safekeeping). On the one hand, end-users may be accustomed to cloud applications’ privacy and security (habituation). On the other hand, these applications quickly adapt to end-user needs on those concerns (reciprocal habituation). Does the old proverb “Custom makes all things easy” apply to privacy and security concerns about cloud application use? Method: This study focuses on Google Docs as an example of standardized, common cloud applications and collects data from 211 of its users. Results: The results show that length of use has significant associations with better usability perception and increased functionality expectation. In turn, improved usability perception leads to decreased security risk concern, while increased functionality expectation increases privacy concerns. Interestingly, usefulness perception is not influenced by privacy concern. Conclusions: Overall, the length of Google Docs use is associated with higher usefulness and increased adoption through greater usability and decreased security concern. Thus, when it comes to standardized, common cloud applications, the old proverb is valid with some exception. Also, “custom” is mutual between cloud applications and their users
    corecore