security study
Recently Published Documents


TOTAL DOCUMENTS

96
(FIVE YEARS 25)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Iqbal Ramadhan ◽  
Rezya Agnesica Helena Sihaloho

This study investigates the dangers of catcalling, which is harmful to women. Catcalling is a form of street sexual harassment that has a negative impact on women's mental health. The goal of this study was to see how well Universitas Pertamina students understood the dangers of catcalling. Pertamina University was chosen as the subject of the study by the author because it is only five years old and has never conducted a survey on catcalling behavior. The author employs a hybrid “explanatory sequential design.”This method was used to collect statistical data from 401 respondents. The statistical data is intended to assess students' understanding of the catcalling phenomenon. The qualitative analysis of this study discusses in the security study using the Copenhagen School Security Study conceptual framework. According to the findings of this survey, one of the most common reasons for women to become victims of catcalling is that they were described as objects (63 percent). Furthermore, 47 percent of respondents understood what catcalling behavior entails. The remainder, or approximately 42 percent of respondents, agreed that catcalling is a bothersome activity. Meanwhile, 68.8 percent of respondents said the way women dressed triggered catcalling. Another 58.9 percent said patriarchal culture was the catalyst for this behavior. The author argues that Universitas Pertamina students already knows catcalling behavior. However, the authors conclude that universities must educate students on catcalling behavior, which stems from patriarchal culture, on a regular basis.


2021 ◽  
Author(s):  
Charles Weir ◽  
Sammy Migues ◽  
Mike Ware ◽  
Laurie Williams

2021 ◽  
Vol 2 (1) ◽  
pp. 23-32
Author(s):  
Peter S. Henne

There are very serious ethical and pragmatic issues in the quantitative and security study of Muslims. From an ethical perspective, many of these studies denigrate and stereotype Muslims. They also treat them as a problem to be solved, justifying and expanding US power. Pragmatically, it can be hard to collect detailed data on security issues in many Muslim countries, making conventional studies difficult. Yet, standard approaches to these problems are faulty. We cannot abandon positivist analysis, as well-done quantitative studies are actually the best tools we have to push back on negative stereotypes of Muslims. At the same time, we cannot ignore important security topics among Muslim states just because the data we have available is not ideal. Instead, I present a two-pronged approach that can address these issues without ignoring crucial aspects of international relations; scholars should follow best methodological practices to avoid ethical issues, and adopt new standards and novel tools to deal with imperfect data.


Author(s):  
Florence Mwagwabi ◽  
Jhee Hee Jiow

What drives teenagers to comply with computer password guidelines? Using an extended form of protection motivation theory (PMT) (Rogers, 1983), we found that even if teenage computer users believe they are susceptible to being hacked, or that being hacked would be detrimental, it has no bearing on their password choices. Other motives outside of PMT also drive teenage security behaviour. Personal norms fully mediate the relationship between the perceived severity of threat and compliance intentions such that perceived severity is not sufficient to encourage compliance. Teenagers must actually feel obligated to comply. While personal norms may encourage compliance, concerns about feeling embarrassed or ashamed if their social media accounts are hacked into actually encourages compliance. On the other hand, peer influence, such as the fear of being teased about someone hacking into their account, discourages compliance. Our study contributes to understanding early security practices and highlights potential differences between adult and teenage behaviours to consider in future studies. For example, our findings suggest that password security guidelines alone will not suffice to ensure teenage compliance; they may need enforced password rules at the authentication level to eliminate any opportunity to violate password rules. Our study will benefit children and parents as well as organizations that have changed work practices to enable employees to work from home, but which places children in danger of clicking on malicious links on their parents’ computers. To our knowledge, this is the first password security study that applies PMT to examine computer-based security behaviours in teenagers.


2021 ◽  
Author(s):  
Gustavo Santana ◽  
Marcello Neto ◽  
Fernando Sapata ◽  
Mauricio Muñoz ◽  
Alexandre M. S. P. Moraes ◽  
...  
Keyword(s):  

2021 ◽  
Author(s):  
Kavintha M. Acharige ◽  
Otávio de P. Albuquerque ◽  
Marcelo Fantinato ◽  
Sarajane M. Peres ◽  
Patrick C. K. Hung
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document