Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
technology acceptance model
biblio
A User-centred Design Approach for Mobile- Government Systems for the Elderly
Submitted by grigby1 on Fri, 10/16/2020 - 10:23am
successful-government systems
pubcrawl
qualitative research methods
quantitative research methods
resilience
Resiliency
security
Senior citizens
Statistics
policy-based governance
technology acceptance model
usability
user acceptance
user centred design
user group
user-centred design approach
user-driven method
user-friendliness
IGUAN framework
collaboration
Cybersecurity
E-Government
e-government services
Electronic government
government data processing
governmental services
Human Factors
acceptance
important benefits
key acceptance factors
m-government for elderly
m-Government prototype
mobile computing
mobile government systems
mobile-government systems
biblio
A Study on The Factors Affecting The Continuous Use of E-Government Services - Focused on Privacy and Security Concerns-
Submitted by grigby1 on Fri, 10/16/2020 - 10:10am
security
privacy concerns
pubcrawl
quality factors
Quality of E-Government Services
quality of service
Reliability of E-government
resilience
Resiliency
risk factors
privacy
security concerns
service quality
Smart PLS
SPSS
system quality
TAM
technology acceptance model
user satisfaction
User satisfaction of E-Government Services
government data processing
Acceptance intention of E-government
collaboration
continuous use intention
Cybersecurity
data privacy
E-Government
e-government service
e-government services
Electronic government
4th Industrial Revolution
Human behavior
information and communication technology
information quality
information system
Information systems
internet
IS access model
Personnel
policy-based governance
biblio
Combatting phishing: A holistic human approach
Submitted by BrandonB on Thu, 04/30/2015 - 12:31pm
security vulnerability
organizational aspects
Phishing
phishing security controls
security
security education
security education training and awareness
security gaps
security training
organisational aspects
social engineering
spoofed-Web sites
technological controls
technology acceptance model
Training
trusted reputation
unsolicited e-mail
fake warnings
ails
awareness programme
COBIT
Computer crime
computer science education
cyber criminals
design science principles
educational factors
agency theory
financial awards
holistic human approach
HOT elements
Human Factors
ISO
lax security behavior
Lead