english

Is This Acceptable ? How factors related to user experience can expand our understanding of the phenomenon of accepting privacy compromises

The protection of personal information is a hot topic in the media. Numerous cases of data theft or malicious use have made headlines, and the public is becoming more worried about it. However, what about issues where the individual offers his personal information’s himself unconsciously, without realizing the risks involved? Technology and its multiple services …

“What works?”: linking evidence-based policing and cybercrime.

The omnipresence of technology and its globalization has changed not only the way we act and interact with each other but also the way we commit crimes. Indeed, the global accessibility of the internet, offers numerous opportunities for committing a criminal offense. This article focuses on cybercrime such as child pornography, fraud or computer hacking. …

User convenience and improving password memorability

Individuals own more and more online accounts to perform various tasks in their daily life. As such, users have been increasing their usage of passwords to access those online accounts. Because of the difficulties in remembering multiple passwords, users often employ risky password behaviours such as password reuse, writing passwords down, choosing weak passwords, and …

Perceptions des adolescents du rôle et de l’impact de l’utilisation de la technologie les violences amoureuses

La cyber violence dans les relations amoureuses (CVRA) (Cyber Dating Violence (CDV)) est l’abus psychologique et / ou la commission d’acte de violence entre partenaires amoureux via l’utilisation de la technologie (téléphones mobiles, SMS, messagerie instantanée, sites de réseaux sociaux, e-mails, etc.). La CVRA comprend des comportements tels que les menaces, l’humiliation, la distribution non …

Adolescents’ perceptions of the role and impact of the use of technology in cyber dating violence

Cyber Dating Violence (CDV) is the psychological abuse and/or perpetration of violent act among dating partners via the use of technology (mobile phones, texting, instant messenger, social networking sites, email, etc.). CDV includes behaviours such as threats, humiliation, non-consensual distribution of personal information or images, sexual pressure, checking up on a partner’s whereabouts, monitoring a …

How can you persuade me online?

As individuals are increasingly reliant on online communication in everyday life, understanding the mechanisms underlying online information processing is essential, especially in the context of one’s trying to persuade its interlocutors. Online information processing is complex for several reasons. First, communication methods vary as they can be asynchronous (e.g. emails ) or synchronous (e.g. instant …

Technostress in university students

Universities worldwide are continually increasing investment in the use of technology-enhanced learning (TEL) to transform conventional education. Moreover, the current context created by the COVID-19 pandemic has prompted universities to change the way they provide instruction to students.  Technology-enhanced learning refers to any form of learning that is facilitated by technology and comes in several …

Defining organizational information security culture

Culture is one of the most challenging aspects to change in an organization. Information security culture is a dynamic phenomenon as it changes over time. Organizations have to focus on maintaining stability while also focusing on continuous development to ensure consistent protection of information resources in a changing environment.  Information security culture is often present …