Anderson, C. L., & Agarwal, R. (2010, September). Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions. MIS Quarterly, 34, 613-643. doi:https://doi.org/10.2307/25750694

Ball, K. S. (2001, December 1). Surveillance Society: Monitoring Everyday Life. Information Technology & People, 14, 406-419. doi: https://doi.org/10.1108/itp.2001.14.4.406.5

Bélanger, F., & Crossler, R. E. (2011, December). Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. 35, 1017-1041. doi:https://doi.org/10.2307/41409971

Benson, V., Saridakis, G., & Tennakoon, H. (2015, August 3). Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? Information Technology & People, 28(3), 426-441. doi:https://doi.org/10.1108/ITP-10-2014-0232

Boral, L., Disla, M., Patil, S., Williams, J., & Park, J. S. (2007). Countering Insider Threats in Personal Devices. 2007 IEEE Intelligence and Security Informatics. doi:10.1109/ISI.2007.379499

ÇELİK, M., ALKAN, M., & ALKAN, A. O. (2020, December 03-04). Protection of Personal Data Transmitted via Web Service Against Software Developers. 2020 International Conference on Information Security and Cryptology (ISCTURKEY). doi:10.1109/ISCTURKEY51113.2020.9308009

Gressin, S. (2017, Septembre 8). The Equifax Data Breach: What to Do. Attorney, Division of Consumer & Business Education, FTC. Retrieved from https://www.penncommunitybank.com/wp-content/uploads/2019/12/The-Equifax-Data-Breach_-What-to-Do-_-Consumer-Information.pdf

Kirkham, T., Winfield, S., Ravet, S., & Kellomäki, S. (2012). The Personal Data Store Approach to Personal Data Security. IEEE Security & Privacy, 11(3), 12-19. doi:10.1109/MSP.2012.137

(2009, January 15). DATA CLASSIFICATION AND HANDLING PROCEDURES GUIDE. KU Policy Library. Retrieved from https://policy.ku.edu/IT/data-classification-handling-procedures

Markopoulos, A., Arvanitis, G., Psilakis, P., Kyriazakos, S., & Stassinopoulos, G. (2003, September 07-10). Security mechanisms maintaining user profile in a personal area network. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. doi:10.1109/PIMRC.2003.1259247

Nakagawa, Y., Matsuda, Y., & Ogi, T. (2013). Framework for handling personal data proposed system of the self-control on buying information. 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013). doi:10.1109/ICITST.2013.6750172

OAIC. (n.d.). The Privacy Act / Rights and responsibilities. Retrieved from OAIC: https://www.oaic.gov.au/privacy/the-privacy-act/rights-and-responsibilities

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *