After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...
At-home DNA testing and sharing in public genealogy databases are becoming widespread. This will facilitate finding out ancestry, genetic relatives, biological parents, making new connections, advancing medicine, and determining predisposition to ...
Third-party mobile applications have become an essential component of modernecosystems such as Android and iOS. The number of these applications has growntremendously in recent years, for instance, the number of Android applications inthe market i...
Co-creation is a form of collaboration in which partners share, improve and blend ideas together to develop a creative product. It helps to share ideas and solve problems in a creative manner. Several co-creativity research works have focused on g...
To explain changes in users' security behaviors and behavioral intentions, we investigated the different messaging approaches that followed the Protection Motivation Theory (PMT) design guidelines. These messaging approaches were used in different...
Bluetooth Low Energy (BLE) beacons are widely adopted in a vast range of industries involving the Internet of things (IoT). BLE is primarily used for indoor location estimation. It is often utilized to provide contextual information with low energ...
Mobile hybrid apps have the potential to dominate the mobile and IoTs apps market. Cross-platform or hybrid apps are providing a promising development choice that appeals to a great body of developers. This development approach \wraps" standard we...
Computer security dialogs communicate important information to users. One avenue where such dialogs are presented are third-party applications, which play an important role in enhancing a user's experience and are popular in online social networks...