This paper reviews literature on computer-mediated communication up to its 1996 publication date, explaining that computer-mediated communication can both depreciate as well as enhance how personal a communication is.
This paper reviews literature on computer-mediated communication up to its 1996 publication date, explaining that computer-mediated communication can both depreciate as well as enhance how personal a communication is.
Phishing is when social engineering is used to deceive a person into sharing sensitive information or downloading...
This paper presents a new way of categorizing behavior change in a framework called the Behavior Grid. This...
Purpose – Cyberattacks have become a major threat to small and medium-sized enterprises. Their prevention efforts...