User profiles for Nele Borgert
Nele BorgertUniversity of Bern Verified email at unibe.ch Cited by 33 |
Self-Efficacy and Security Behavior: Results from a Systematic Review of Research Methods
Amidst growing IT security challenges, psychological underpinnings of security behaviors
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one’s …
have received considerable interest, eg cybersecurity Self-Efficacy (SE), the belief in one’s …
Home Is Where the Smart Is: Development and Validation of the Cybersecurity Self-Efficacy in Smart Homes (CySESH) Scale
The ubiquity of devices connected to the internet raises concerns about the security and
privacy of smart homes. The effectiveness of interventions to support secure user behaviors is …
privacy of smart homes. The effectiveness of interventions to support secure user behaviors is …
Navigating a heavy industry environment using augmented reality-a comparison of two indoor navigation designs
The fourth industrial revolution seeks to enhance and optimize industrial processes through
digital systems. However, such systems need to meet special criteria for usability and task …
digital systems. However, such systems need to meet special criteria for usability and task …
[PDF][PDF] The Study of Cybersecurity Self-Efficacy: A Systematic Literature Review of Methodology
The aim of this project is to obtain a systematic assessment of the methodological practices
in Cybersecurity Self-Efficacy (CSE) research. CSE is the belief about one’s own ability to …
in Cybersecurity Self-Efficacy (CSE) research. CSE is the belief about one’s own ability to …
A Decade of Dividedness: A Preregistered Systematic Review of the Cybersecurity Self-Efficacy Methods
Recent challenges in IT security and privacy have heightened interest in cybersecurity Self-Efficacy
(SE) as means to influence security-related behaviors. Based on diverging …
(SE) as means to influence security-related behaviors. Based on diverging …
[PDF][PDF] Share It—A New Paradigm for Interactions with Intelligent Cognitive Assistants
N Borgert, S Holtel - womencourage.acm.org
This research project tests Shared Decision Making (SDM) as a new work-psychological
paradigm for interactions between humans and Intelligent Cognitive Assistants (ICAs) in …
paradigm for interactions between humans and Intelligent Cognitive Assistants (ICAs) in …
Erfahrbarer Datenschutz und IT-Sicherheit in Smart Home-Anwendungen
Smart Home-Systeme finden eine immer weitere Verbreitung. Allerdings ergeben sich
hieraus Fragen der IT-Sicherheit und des Datenschutzes für EndnutzerInnen. Oftmals ist nicht …
hieraus Fragen der IT-Sicherheit und des Datenschutzes für EndnutzerInnen. Oftmals ist nicht …
Do I Value My Private Data? Exploring Model-Driven Predictions on the Willingness to Use Smart Home Devices
Smart home devices, increasingly prevalent in modern households, collect large amounts of
data from their immediate environment. These data are often of significant monetary value …
data from their immediate environment. These data are often of significant monetary value …
Literature Review of Cybersecurity Self-Efficacy
Overall Project Description: The goal of this project is to obtain a systematic assessment of
how cybersecurity self-efficacy research is conducted. We will work on two topics:(1) metrics …
how cybersecurity self-efficacy research is conducted. We will work on two topics:(1) metrics …
A contribuição de uma ferramenta de business intelligence na gestão de custos: a experiência do Estado de Santa Catarina
Dentro de uma perspectiva de modernização da gestão pública este artigo apresenta um
estudo teórico-empírico demonstrando a experiência de utilização de uma ferramenta de …
estudo teórico-empírico demonstrando a experiência de utilização de uma ferramenta de …