Young People s Security Behavior Intentions regarding Cloud Service Use: Suggestions
|
|
- Harriet Gaines
- 5 years ago
- Views:
Transcription
1 Young People s Security Behavior Intentions regarding Cloud Service Use: Suggestions for Better Cloud Services P.I.M. Kamphuis pim.kamphuis@gmail.com P.I.M. Kamphuis (BA in Communication, Fontys, Tilburg the Netherlands 2015) is a graduate student at the Department of Interaction Science, Sungkyunkwan University, South Korea and currently working as a freelance cloud consultant (CoCreatures, 2014). His research interests include cloud computing, cloud security and global collaboration networks and platforms. He is currently involved with living labs - collaboration projects connecting universities, local governments and companies in South Korea and the Netherlands. Jang Hyun Kim jangkimuh@gmail.com Dr. Jang Hyun Kim (Ph.D. in Communication, State University of New York at Buffalo, 2007) is an Associate Professor and Department Chair of Department of Interaction Science, Sungkyunkwan University, South Korea. His research interests include data science, social and semantic network analysis, Internet of things, and other advanced technologies and, in particular, their impact on society. He also teaches user experiences and media management, media contents analysis using big data analysis, and other courses. 1
2 Abstract The purpose of this study is to measure intended security behaviors of university students using personal cloud services in Korea and the Netherlands, to examine what attitudinal factors influence these intentions and to find out if there is a difference in security intentions between Korean and Dutch students. The Theory of Planned Behavior (TPB) model is combined with external constructs from the Security Behavior Intention Scale (SeBIS) about security intentions of students cloud access devices. A questionnaire set comprising three TPB factors and four SeBIS factors was applied to a sample of 226 higher education students in Korea and the Netherlands. Results show that the students intention on securing cloud access devices (CADs) is found and that the two groups differ in terms of the TPB constructs and the actual security intention are significant. Key words: Cloud services, cross-cultural research, Theory of Planned Behavior, Security Behavior Intention Scale, user analysis, survey. 2
3 Introduction Emerging cloud services have been changing the ways in which people store, access and share their personal information. It also changed the way of communicating with each other; shifting from device storage based messaging techniques such as SMS and , to cloud-based messaging services like Facebook messenger, KakaoTalk, Gmail, and Telegram. Most cloud messaging service like Gmail, Outlook.com, and Naver offer free access to a cloud storage pool where users can store files including documents, pictures, and movies. In addition to free cloud storage that is offered by cloud messaging services, the popularity of dedicated cloud storage services like Dropbox and Mega keeps increasing. According to Gartner (2012), users will store over 36% of their personal data in the cloud in Students take a big share in worldwide users of personal cloud services (Hunsinger & Corley, 2012). They store and share their personal data using a cloud access device and often prefer to use their personal cloud storage account over the use of storage and sharing services that are provided by universities (Stantchev, Colomo-Palacios, Soto-Acosta, & Misra, 2014). To keep their data safe and confidential, users should take care of their credentials and devices. It is however questionable to what extend students intent to do so. In this study, we will examine students intention on securing their personal cloud accounts and cloud access devices and apply the Theory of Planned Behavior to see what factors influence this intention. The paper is structured as follows. The next section presents the literature and theories that form the framework for the study. Following that, the method for sampling and data collection is discussed. Finally, this paper ends/concludes with an analysis on the results and a discussion on the research findings. 3
4 Theoretical Approaches to Cloud Use Personal Cloud Services Personal cloud services facilitate highly scalable storage for end-users on demand, which is accessible globally at any time. Using cloud storage increases usability, since users do not have to drag and drop files to and from physical storage media (like USB flash drives); decreases the amount of data/bandwidth used when sharing media (a link to the shared cloud storage location will do); increases accessibility (files can be stored and accessed from anywhere as long as connected to the internet); can be used for disaster-recovery (no files will be lost in case of a stolen, broken or crashed device); and can save users costs for local storage since cloud storage is available from 3 cents per gigabyte and does not require local power to store information remotely (NT, 2014). One of the reasons for the rapid growth in availability and popularity of personal cloud services is the emergence of (smart) devices that provide access to personal cloud storage and services. Mobile devices that enable access to cloud services (e.g. laptops, tablets, and smartphones) became an essential part of modern life and are effective communication tools that are not bounded by time and place. However, the smaller and more portable the form factor, the less resources (e.g. battery capacity, cpu power and storage) it provides. Personal cloud services help users overcome these limitations, including (1) extending battery lifetime, (2) improving battery power, and (3) battery reliability. Battery life is one of the biggest concerns of smart phone users. Personal cloud services provide a variety of computation offloading techniques to use less CPU power, which results in longer battery life. In addition, improving data storage capacity and processing power is another way to enhance usability. Personal cloud services enable users to store and access a large amount of data in the cloud. The latest development in mobile devices includes the embedding and improvement of 4
5 camera modules and thus increases the demand for storage of high quality media such as video and pictures. Uploading media to the cloud right after the moment of capturing saves users a considerable amount of battery power and local storage, and they may access all media from any device instantly. Improving reliability is possible because personal cloud services store data on a spread grid of computers and take care of back-ups. Users can improve the reliability of their files and media by uploading their date to the cloud. This reduces the chances of loss of valuable personal data like pictures, videos, documents and other data in case of broken, lost or infected CADs (Dinh, Lee, Niyato, & Wang, 2013). To use a personal cloud services, users usually have to go through an identification and authentication process to gain access to their account or to create a session for an app (or apps) for easy and permanent use through CAD. The most common authentication mechanism is the use of credentials in the form of a combination of user ID and password. While most websites automatically end the session (log out) after closing the web browser or tab, dedicated cloud service apps installed on smartphones and tablets keep a session active/open until the user logs out or disables/uninstalls the application (Bang, Lee, Bae, & Ahn, 2012). Because of software to has the tendency to save credentials in web browsers and the emergence of apps that serve a permanent connection, special attention is required to securing cloud access devices in order to keep personal data safe and confidential. Security Intention Previous research on securing personal cloud services has focused on a wide range of technical aspects and concerns. Access security measures are generally considered in three steps: Authentication, Authorization, and Encryption (Yahya, 2015). However, Bang et al. (2012) suggest that cloud security is not merely a technical issue but also involves the behavior 5
6 of end-users, which are mostly users with a non-technical background and therefore low technical knowledge. Many scholars try to understand users security related behaviors or emphasize on security-enhancing actions, mostly in work environment settings. However, unlike employees, students are usually not provided with training or protection by an ITdepartment regarding the security of their online accounts. And despite the plethora of advice by all usable security and privacy communities, much of the advice stays unnoticed or ignored by the majority of the personal cloud service users (Das, 2016). In this paper, the intentions of students on securing their personal cloud service accounts are measured using the Security Intention Behavior Scale, and studied by applying the Theory of Planned Behavior in order to find out what attitudinal factors influence these intentions. Theory of planned behavior (TPB) According to the Theory of Planned Behavior, attitudes towards intention derive from behavioral beliefs that people hold (Ajzen, 1985;1991). The TBP suggests that behaviors with a desirable outcome are valued with a positive attitude, while negative attitudes address undesirable behaviors. The TPB model suggests three major factors that determine behavioral intentions (see figure 1): Attitudes: beliefs about consequences of the behavior and the corresponding judgments about these consequences. Simply put, students judgement that performing the behavior is good or bad. Subjective norms: beliefs about how other people, who are considered important to the person, would like them to behave and the motivation to comply with those normative beliefs. 6
7 Perceived behavior control: beliefs about factors that make it ease or difficult to perform the behavior and the corresponding power of these factors to influence the behavior (Ajzen, 1991). FIGURE 1 SIMPLIFIED ILLUSTRATION OF TPB MODEL AND SEBIS IMPLICATION Figure 1 illustrates the model for this paper and shows a simplified model of TPB and SeBIS. The TPB is devoted to identifying barriers and enablers to behavioral intentions and therefore an useful approach on explaining students security intentions. The theory can help to explain why students have high or low intentions on securing their cloud access devices, because it offers a clearly defined structure/model that allows the investigation of attitudinal factors. In addition, knowledge alone is not effective in changing behavior. When we understand the predictors of students security intention we can fine-tune campaigns to aim at attitudes, subjective norms or perceived behavior control in order to raise security on students cloud access devices. A review by East (1997) has indicated that, in recent years, the TPB has been applied to a wide variety of topics (e.g. physical activities, quitting cigarette smoking, blood donation, complaining, Internet use etc.) and that the model has provided reliable estimates. 7
8 The study focuses particularly upon the case of university students in Korea and the Netherlands, these countries are one of the most advanced countries with respect to the adoption and use of new communication technologies (Park, Kim, Shon, & Shin, 2013). According to Statista (2016), both Korea and the Netherlands top the list of countries with the largest share of high broadband connectivity and the list of countries with the highest average internet connection speed. This makes the use of personal cloud services enjoyably fast and a convenient way for students to safely store, share and collaborate on their personal and academic documents (Stantchev, Colomo-Palacios, Soto-Acosta, & Misra, 2014). Research question and hypotheses This study aims to examine the following research questions: RQ 1. What is the student s intention on securing their cloud access devices? RQ2. What factors influence students intention on securing their cloud access devices? H1. Students attitude influence intention on securing CADs. H2. Students subjective norms influence intention on securing CADs. H3. Students perceived behavior control influence intention on securing CADs. RQ3. Is there a significant difference between Korean and Dutch students on their intention to secure cloud access devices? The questions and hypotheses above are addressed in the following sections. Method and procedures The sample for this study consists of 226 students (n = 226), of which 120 were studying at a Korean university (53%) while the other 106 were studying in the Netherlands (47%). Most respondents are in the age between 21 and 26 (74.8%). A minority of the students 8
9 was younger than 21 (8%) and 39 respondents were older than 26 (17.3%). The sample included 139 women (61.5%) and 87 men (38.5%). An on-line survey was operationalized using Google Forms and administered via a short notice with hyperlink on both universities students portal. In the survey, respondents were asked questions which operationalized the Theory of Planned Behavior and items as applied to the Security Behavior Intention Scale. Recorded on a scale, their answers represent the salient believes answered about attitude, subjective norms and perceived behavior control and intentional behavior on device securement, password generation, proactive awareness and software updating. All questions were marked as required and the form could not be submitted without incomplete answers. Because of this, the dataset with responses does not include any invalid or uncomplete records. This was all done during the end of fall semester of The responses were collected during a one-week period. After this, the raw data from the questionnaires was exported from Google Forms, coded in Microsoft Excel and then analyzed using IBM SPSS. While this sampling strategy has clear advantages in terms of time- and cost-savings, as suggested by Margaryan, Littlejohn, and Vojt (2011), it does not account for the total number of potential participants, although it can be considered with enough statistical power given the total sample size. Security Intention Behavior Scale In 2015 Egelman and Peer developed the Security Intention Behavior Scale (SeBIS), a tool to measure security behaviors of end-users. In short, the scale measures users selfreported adherence to computer security advice and consists of 16 items that measure 4 underlying constructs: 9
10 Awareness: Do users pay attention to contextual cues, such as the web browser URL bar or various security iconography? Passwords: Do users create unique passwords that exceed minimum requirements and are therefore difficult to crack? Updating: Do users apply software security updates in a timely manner? Securement: Do users secure their devices with secret codes, such as using smartphone secure lock screens (i.e., requiring a PIN) or password-protected screen savers on desktops and laptops? To test if the measured intentions indeed correlate with actual behavior Egelman, Harbach and Peer performed three experiments to identify correlations between the four subscales of their measurement scale and actual security related behavior (2016). The results indicate that SeBIS predicts certain computer security behaviors and that it is a reliable and valid tool that should be used in future research. This paper adapts the SeBIS to measures students intention on securing their cloud access devices. The Theory of Planned Behavior is adapted to measure attitudinal factors that influence the security intentions. Measures Attitude Attitude towards securing CAD is a construct of TPB and was directly measured using four statements. Students were asked to indicate their level of desirability on a 5-point Likert scale (undesirable desirable) with each of the following statements: Att1. Making sure that my laptop/smart device is locked when I don t use it is Att2. Using a different and strong password for all my on-line accounts is Att3. Checking if forms I use and links I click on the internet are safe and secure is 10
11 Att4. Running the latest version of the software and apps that I use is Device security Device security is a construct of the SeBIS and was directly measured using four statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: Ds1. I set my computer screen to automatically lock if I don t use it for a prolonged period of time. Ds2. I always use a password/passcode to unlock my laptop or tablet. Ds3. I manually lock my computer screen when I step away from it. Ds4. I use a PIN, fingerprint, or passcode to unlock my mobile phone. Subjective norms Subjective norms regarding securing CAD are a construct of TPB and was directly measured using four statements. Students were asked to indicate their level of desirability on a 5-point Likert scale (undesirable desirable) with each of the following statements: Sn1. My friends/family want me to secure my devices really well. Sn2. My friends/family expect me to use strong and different passwords for my accounts. Sn3. It is expected of me that I check if websites and links are safe before use. Sn4. It is expected of me that my apps and software are up-to-date. Password generation 11
12 Password generation is a construct of the SeBIS and was directly measured using four statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: Pg1. I do not change my passwords, unless I have to. Pg2. I use different passwords for different accounts that I have. Pg3. When I create a new online account, I try to use a password that goes beyond the site s minimum requirements. Pg4. I do not include special characters in my password if it s not required. Perceived behavior control Perceived behavior control of securing CAD are a construct of TPB and was directly measured using five statements. Students were asked to indicate their level of desirability on a 5-point Likert scale (undesirable desirable) with each of the following statements: Bc1. It is difficult to remember a different password for every account. Bc2. It is easy to come up with a long password, consisting of small/caps letters, numbers and special characters. Bc3. It is difficult to remember to log out on a PC after using my on-line account. Bc4. I think it is hard to tell if some link is safe to click. Bc5. I think it is hard to determine if the used website/service is safe. Proactive awareness Proactive awareness is a construct of the SeBIS and was directly measured using four statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: 12
13 Pa1. When someone sends me a link, I open it without first verifying where it goes. Pa2. I know what website I m visiting based on its look and feel, rather than by looking at the URL bar. Pa3. I submit file/information to cloud services without first verifying that it will be sent securely (e.g., SSL, a lock icon). Pa4. If I discover a security problem, I continue what I was doing because I assume someone else will fix it. Software updates Software updates is a construct of the SeBIS and was directly measured using three statements. Students were asked to indicate their level of agreement on a 5-point Likert scale (totally disagree totally agree) with each of the following statements: Su1. When I m prompted about a software update, I install it right away. Su2. I try to make sure that the apps and software I use are up-to-date. Su3. I verify that my anti-virus software has been regularly updating itself. Cronbach s alpha was used to measure the internal reliability of each construct. The calculated alphas of the SeBIS constructs meet the minimum acceptable value of.7, while only the subjective norm construct from the TPB section meets this threshold. BC2 and BC3 were excluded from the analysis in order to increase reliability of the perceived behavior control composite scale. Both attitude and pbc could not meet the reliability minimum. Table 1 shows an overview of the results for Cronbach Alpha of each construct. 13
14 TABLE 1 INTERNAL RELIABILITY OF THE 7 MEASURED COMPOSITE SCALES Cronbach s Alpha N of items Device Security Password Generation Proactive Awareness Software Updates Attitude Subjective Norm Perceived Behavior Control After calculating the reliability of the composite scales, an index was made for each construct by summing up the values of its items and divide the total by the number of items. An extra index was calculated by combining the 4 dimensions of the Security Behavior Intention Scale into one variable (SeBIS). Results To examine RQ1, frequency tables were used to see the means of the four dimensions of the Security Behavior Intention Scale. TABLE 2 MEANS OF THE 4 MEASURED SEBIS COMPOSITE SCALES N Valid Missing Mean Median Mode Std. Deviation Device Security ,7058 4,0000 4,00,96766 Password Generation ,6903 2,5000 2,00,77980 Proactive Awareness ,9502 3,0000 2,75,79268 Software Updates ,1121 3,0000 3,33,
15 From table 2 we can find that students have low behavior intentions on password generation (M=2.69), proactive awareness (M=2.95) and device updating (M=3.11). Students seem to have higher intentions on device securement (M=3.71). Linear regression was employed to address RQ2 and explore relationships between the TBP factors and the security intention (SeBIS). A low p-value (< 0.05) indicates that the hypotheses are grounded. TABLE 3 REGRESSION COEFFICIENTS Unstandardized Coefficients Standardized Coefficients Model B Std. Error Beta t Sig. 1 (Constant) 1,833,169 10,880,000 Attitude,185,034,318 5,382,000 Subjective Norm,234,035,391 6,710,000 Perceived Behavior Control -,035,038 -,055 -,938,349 a. Dependent Variable: SeBIS Regression analysis (table 3) shows that H1 is supported. The correlation between Attitude and Security Intention =.318. It is therefore concluded that Attitude is significantly and positively correlated with the intent of students to secure their CADs. H2 is also supported. The correlation between Subjective Norm and Security Intention =.391. Therefore, the data indicates that the Subjective Norm is significantly and positively correlated with the intent of students to secure their CADs. H3 is not supported. The correlation between Perceived Behavioral Control and Security Intention = Therefore, the data indicates Perceived Behavioral Control is not correlated with the intent of students to secure their CADs. The reason for a negative value is the use of a reversed scale to measure perceived behavior control. 15
16 However, when regression analysis is made between the composite variable Perceived Behavior Control and the separate dimension of the SeBIS, correlation is found between Perceived Behavior Control and the SeBIS constructs Password Generation and Proactive Awareness, as shown in table 4. TABLE 4 REGRESSION COEFFICIENTS Perceived Behavior Control Device Security Password Generation Proactive Awareness Software updates Pearson Correlation -,015,346 ** -,492 **,073 Sig. (2-tailed),819,000,000,278 N To answer RQ3, a descriptive and regression analysis was run again in split mode, dividing our collected data into two groups: one set of data collected from Korean students and one set from students studying in the Netherlands. No remarkable differences were found when analyzing the frequency tables and means of several constructs. In addition, when running a regression analysis with split data no significant differences were discovered. Discussion and limitations When we look at the results of this study we can conclude that there is room for improvement for student s intention on securing their cloud access devices. Overall, students seem to secure their devices above average using fingerprint and PIN security to gain access to their CAD. However, students seem to have low intentions on increasing password security, updating devices and being proactive about the safety of web-services, links, and forms. Through the results gathered from the survey, this study has provided a better understanding of 16
17 the factors which influence students intention on security. This is important for several reasons. If organizations (e.g. universities, banks, or personal cloud service providers) aim to increase the security intentions of students, they should focus on changing students attitude and removing barriers in perceived behavior control when trying to achieve better password generation and increase proactive awareness. Considering the strong support in the Theory of Planned Behavior literature indicating a significant relationship between the three constructs and behavioral intention, it was initially surprising to detect no significant difference between the correlation among the two groups. One of the limitations of this study is the low internal reliability of the TPB measurements. To increase internal reliability, the number of respondents should be doubled. In addition, the questionnaire items regarding TPB required more preparation. Due to the limit of available time for this research, the suggested interviews to derive more specific and effective items for the questionnaire and pilot testing of the survey were omitted. The sample size should be bigger to make the results more representative. 17
18 References Ajzen, I. (1991). The Theory of Planned Behavior. Organizational behavior and human decision processes, 50, Bang, Y., J., L. D., S., B. Y., & H., A. J. (2012). Improving information security management: An analysis of ID password usage and a new login vulnerability measure. international journal of information management, 32(5), Bang, Y., Lee, D.-J., Bae, Y.-S., & Ahn, J.-H. (2012). Improving information security management: An analysis of ID password usage and a new login vulnerability measure. International Journal of Information Management, 32, Das, S. (2016, 3 7). Understanding and Leveraging Social Influence to Improve End-User Security Sensitivity. Berkeley. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013, 10 11). A survey of mobile cloud computing: architecture, applications, and approaches. WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, 13. Egelman, S., Harbach, M., & Peer, E. (2016). Behavior Ever Follows Intention? CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, Gartner. (2012, 6 25). Gartner Says That Consumers Will Store More Than a Third of Their Digital Content in the Cloud by Retrieved from Gartner: Hunsinger, D. S., & Corley, J. K. (2012). An Examination of the Factors Influencing Student Usage of Dropbox, a File Hosting Service. Proceedings of the Conference on Information Systems Applied Research. 18
19 Margaryana, A., Littlejohna, A., & Gabrielle Vojtb. (2011). Are digital natives a myth or reality? University students use of digital technologies. Computers & Education, 56(2), NT, B. (2014, 7 28). 5 advantages and disadvantages of Cloud Storage. Retrieved 6 17, 2016, from Big Data made simple: Park, N., Kim, Y.-C., Shon, H., & Shin, H. (2013, 3 27). Factors influencing smartphone use and dependency in South Korea. Com puters in Human Behavior, 29, Stantchev, V., Colomo-Palacios, R., Soto-Acosta, P., & Misra, S. (2014). Learning management systems and cloud file hosting services: A study on students acceptance. Computers in Human Behavior, 31, Statista. (2016, 3 1). Statista. Retrieved 4 29, 2016, from Countries with the highest average internet connection speed as of 4th quarter 2015 : Yahya, F. W. (2015). Protecting data in personal cloud storage with security classifications. Science and Information Conference (pp ). SAI: IEEE. 19
Online Journal for Weightlifters & Coaches
Online Journal for Weightlifters & Coaches WWW.WL-LOG.COM Genadi Hiskia Dublin, October 7, 2016 WL-LOG.com Professional Online Service for Weightlifters & Coaches Professional Online Service for Weightlifters
More informationTitle: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI
Title: The Theory of Planned Behavior (TPB) and Texting While Driving Behavior in College Students MS # Manuscript ID GCPI-2015-02298 Appendix 1 Role of TPB in changing other behaviors TPB has been applied
More informationmyphonak app User Guide
myphonak app User Guide Getting started myphonak is an app developed by Sonova, the world leader in hearing solutions based in Zurich, Switzerland. Read the user instructions thoroughly in order to benefit
More informationUSER GUIDE: NEW CIR APP. Technician User Guide
USER GUIDE: NEW CIR APP. Technician User Guide 0 Table of Contents 1 A New CIR User Interface Why?... 3 2 How to get started?... 3 3 Navigating the new CIR app. user interface... 6 3.1 Introduction...
More informationMeasurement of Constructs in Psychosocial Models of Health Behavior. March 26, 2012 Neil Steers, Ph.D.
Measurement of Constructs in Psychosocial Models of Health Behavior March 26, 2012 Neil Steers, Ph.D. Importance of measurement in research testing psychosocial models Issues in measurement of psychosocial
More informationAMERICAN CANCER SOCIETY FUNDRAISING APP FAQS
AMERICAN CANCER SOCIETY FUNDRAISING APP FAQS We're here to answer any questions you might have about the American Cancer Society Fundraising App. Below are answers to some of the most frequently asked
More informationInstructor Guide to EHR Go
Instructor Guide to EHR Go Introduction... 1 Quick Facts... 1 Creating your Account... 1 Logging in to EHR Go... 5 Adding Faculty Users to EHR Go... 6 Adding Student Users to EHR Go... 8 Library... 9 Patients
More informationData Management System (DMS) User Guide
Data Management System (DMS) User Guide Eversense and the Eversense logo are trademarks of Senseonics, Incorporated. Other brands and their products are trademarks or registered trademarks of their respective
More informationQuick guide to connectivity and the Interton Sound app
Quick guide to connectivity and the Interton Sound app Content Compatibility: Hearing aids and mobile devices... 4 Get started with your iphone, ipad or ipod touch... 6 Pair with your Interton hearing
More informationTopic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB)
Topic 1 Social Networking Service (SNS) Users Theory of Planned Behavior (TPB) Flow Experience Perceived Enjoyment Trust Attitude Subjective Norm Actual Use Self Efficacy Perceived Behavioral Control Introduction
More informationContent Part 2 Users manual... 4
Content Part 2 Users manual... 4 Introduction. What is Kleos... 4 Case management... 5 Identity management... 9 Document management... 11 Document generation... 15 e-mail management... 15 Installation
More informationReSound Forte and ReSound Smart 3D App For Android Users Frequently Asked Questions
ReSound Forte and ReSound Smart 3D App For Android Users Frequently Asked Questions GENERAL Q. I have an Android phone. Can I use ReSound Forte? Q. What Android devices are compatible with ReSound Forte
More informationThe Hospital Anxiety and Depression Scale Guidance and Information
The Hospital Anxiety and Depression Scale Guidance and Information About Testwise Testwise is the powerful online testing platform developed by GL Assessment to host its digital tests. Many of GL Assessment
More informationKINOMAP FITNESS. Version Android KINOMAP FITNESS
Version 1.1 - Android With Kinomap Fitness, ride more than 100,000 km of geolocated videos all over the world uploaded by users themselves. Try to follow their rhythm under the same conditions at the time
More informationData Management System (DMS) User Guide
Data Management System (DMS) User Guide Eversense and the Eversense logo are trademarks of Senseonics, Incorporated. Other brands and their products are trademarks or registered trademarks of their respective
More informationInternet Banking - FAQ -
Internet Banking - FAQ - About Hong Leong Connect services Q1. What is Hong Leong Connect? A1. Hong Leong Connect brings you a host of digital banking services offered by Hong Leong Bank (Cambodia) Plc.
More informationPSYCHOLOGY HUMAN SUBJECT POOL AY
General Features of the Psychology Human Subject Pool The Psychology Human Subject Pool (Subject Pool) provides a system for coordinating enrollment in Department research involving human subjects. The
More informationTable of Contents. Contour Diabetes App User Guide
Table of Contents Introduction... 3 About the CONTOUR Diabetes App... 3 System and Device Requirements... 3 Intended Use... 3 Getting Started... 3 Downloading CONTOUR... 3 Apple... 3 Android... 4 Quick
More informationAll major devices and browsers. ADHD Diploma
ADHD Diploma DURATION LOCATION COMPATIBILITY SUPPORT 12 hours Online All major devices and browsers We are here to help if you have any problems ADHD Diploma The ADHD course will give you the information
More informationMore skilled internet users behave (a little) more securely
More skilled internet users behave (a little) more securely Elissa Redmiles eredmiles@cs.umd.edu Shelby Silverstein shelby93@umd.edu Wei Bai wbai@umd.edu Michelle L. Mazurek mmazurek@umd.edu University
More informationCOLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD GUIDANCE ON ELECTRONIC INFORMED CONSENT
COLUMBIA UNIVERSITY INSTITUTIONAL REVIEW BOARD GUIDANCE ON ELECTRONIC INFORMED CONSENT I. BACKGROUND Electronic consenting ( e-consenting ) is the use of electronic systems and processes, whether in person
More informationConnectivity guide for ReSound Smart 3D app
Connectivity guide for ReSound Smart 3D app Table of contents Introduction to ReSound Smart Hearing Aids... 3 Mobile Devices that Work with ReSound Smart Hearing Aids... 3 Connectivity and ReSound Smart
More informationUpToDate Anywhere. Registration Guide. This Registration Guide outlines how to: Register for a free account Access UpToDate Stay current
When you have to be right UpToDate Anywhere Registration Guide This Registration Guide outlines how to: Register for a free account Access UpToDate Stay current www.uptodate.com www.wolterskluwer.com Your
More informationWALK MS 2014 WELCOME PACKET
Central & Eastern Virginia Chapter 2014 WALK MS 2014 WELCOME PACKET WALK TO CREATE A WORLD FREE OF MS National MS Society, Central & Eastern Virginia Chapter Richmond Office: 4200 Innslake Drive, Suite
More informationConnect to your client. Guide
Connect to your client Guide Welcome Thank you for your participation in this limited introduction of RemoteCare Oticon RemoteCare allows you to send updated settings and make adjustments real-time to
More informationUser Manual. RaySafe i2 dose viewer
User Manual RaySafe i2 dose viewer 2012.03 Unfors RaySafe 5001048-A All rights are reserved. Reproduction or transmission in whole or in part, in any form or by any means, electronic, mechanical or otherwise,
More informationNokia Health Mate app
Your Activity Tracker and Life Coach User Guide EN - 1 Table of Contents What is the?...3 Requirements 3 Smartphone or device 3 Installing the app...4 Accounts 4 App Navigation...7 The Timeline 7 Dashboard
More informationContour Diabetes app User Guide
Contour Diabetes app User Guide Contents iii Contents Chapter 1: Introduction...5 About the CONTOUR DIABETES app...6 System and Device Requirements...6 Intended Use...6 Chapter 2: Getting Started...7
More informationAbout this consent form
Protocol Title: Development of the smoking cessation app Smiling instead of Smoking Principal Investigator: Bettina B. Hoeppner, Ph.D. Site Principal Investigator: n/a Description of Subject Population:
More informationKeywords: consultation, drug-related problems, pharmacists, Theory of Planned Behavior
DEVELOPMENT OF A QUESTIONNAIRE BASED ON THE THEORY OF PLANNED BEHAVIOR TO IDENTIFY FACTORS AFFECTING PHARMACISTS INTENTION TO CONSULT PHYSICIANS ON DRUG-RELATED PROBLEMS Teeranan Charoenung 1, Piyarat
More informationTHIM User Manual 1.0 GETTING STARTED 3 WHAT YOU LL FIND IN THE BOX 3
User Manual THIM is not a medical device. The information contained in this document is not intended to be used as medical information or as a substitute for your own health professional s advice. As a
More informationDiabetes Management App. Instruction Manual
Diabetes Management App Instruction Manual Accu-Chek Connect Diabetes Management App Overview The Accu-Chek Connect diabetes management app (hereafter referred to as the app) is designed to help you: Transfer
More informationShare/Follow. User Guide. A feature of Dexcom G5 Mobile CGM System
Share/Follow User Guide A feature of Dexcom G5 Mobile CGM System IMPORTANT USER INFORMATION Please review your product instructions before using your continuous glucose monitoring system. Contraindications,
More informationStep-by-Step Guide to Using Salesforce ( to Request an Interpreter
Victim Services Interpreter Bank Getting Started Step-by-Step Guide to Using Salesforce (https://interpreterbank.force.com) to Request an Interpreter Login Credentials To sign into Ayuda s interpreter
More informationEnhanced Asthma Management with Mobile Communication
Enhanced Asthma Management with Mobile Communication P.S. Ngai, S. Chan, C.T. Lau, K.M. Lau Abstract In this paper, we propose a prototype system to enhance the management of asthma condition in patients
More informationAvailable online at ScienceDirect. Procedia Computer Science 67 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 67 (2015 ) 185 192 6th International Conference on Software Development and Technologies for Enhancing Accessibility and
More informationWALK MS 2015 WELCOME PACKET
WALK MS 2015 WELCOME PACKET Virginia West Virginia Chapter 2015 WALK TO CREATE A WORLD FREE OF MS National MS Society, Virginia - West Virginia Chapter Richmond Office: 4200 Innslake Drive, Suite 301,
More informationConnectivity guide for. BeMore app
Connectivity guide for BeMore app Compatible AGXR aids These AGXR aids work with the BeMore app. If you re in doubt, please ask your hearing care professional. Table of contents Introduction to AGXR hearing
More informationCollecting & Making Sense of
Collecting & Making Sense of Quantitative Data Deborah Eldredge, PhD, RN Director, Quality, Research & Magnet Recognition i Oregon Health & Science University Margo A. Halm, RN, PhD, ACNS-BC, FAHA Director,
More informationRESULTS REPORTING MANUAL. Hospital Births Newborn Screening Program June 2016
RESULTS REPORTING MANUAL Hospital Births Newborn Screening Program June 2016 CONTENTS GETTING STARTED... 1 Summary... 1 Logging In... 1 Access For New Hires... 2 Reporting Parental Refusals... 3 Adding
More informationCrime Scene Investigation. Story
Crime Scene Investigation Story Joe works as Detective in the Crime Scene Unit (CSU), which is a part of the SPD Detective Bureau's Forensic Investigations Division in Smallville City Police Department.
More informationImproving Informed Consent to Clinical Research. Charles W. Lidz Ph.D.
Improving Informed Consent to Clinical Research Charles W. Lidz Ph.D. Housekeeping Items Please note that this broadcast is being recorded and will be available soon for viewing on SPARC s website. Please
More informationQuick guide to connectivity and the ReSound Smart 3D app
Quick guide to connectivity and the ReSound Smart 3D app 2 Content Compatibility: Hearing aids and mobile devices...4 Get started with your iphone, ipad or ipod touch...6 Pair with your ReSound Smart Hearing
More informationElemental Kinection. Requirements. 2 May Version Texas Christian University, Computer Science Department
Elemental Kinection Requirements Version 2.1 2 May 2016 Elemental Kinection Requirements i Revision History All revision history listed below. Version Change Summary Date 1.0 Initial Draft 10 November
More informationBusiness Research Methods. Introduction to Data Analysis
Business Research Methods Introduction to Data Analysis Data Analysis Process STAGES OF DATA ANALYSIS EDITING CODING DATA ENTRY ERROR CHECKING AND VERIFICATION DATA ANALYSIS Introduction Preparation of
More informationSMS USA PHASE ONE SMS USA BULLETIN BOARD FOCUS GROUP: MODERATOR S GUIDE
SMS USA PHASE ONE SMS USA BULLETIN BOARD FOCUS GROUP: MODERATOR S GUIDE DAY 1: GENERAL SMOKING QUESTIONS Welcome to our online discussion! My name is Lisa and I will be moderating the session over the
More informationINFLUENCING FLU VACCINATION BEHAVIOR: Identifying Drivers & Evaluating Campaigns for Future Promotion Planning
INFLUENCING FLU VACCINATION BEHAVIOR: Identifying Drivers & Evaluating Campaigns for Future Promotion Planning Cathy St. Pierre, MS ACHA 2011 Annual Conference June 1, 2011 H1N1 Flu Media Coverage Source:
More informationStudent Guide to EHR Go
Student Guide to EHR Go I. Introduction... 1 II. Quick Facts... 1 III. Creating your Account... 1 IV. Applying Your Subscription... 4 V. Logging in to EHR Go... 7 VI. Library... 8 VII. Receiving Assignments
More informationHow-To Evaluate a Veterinary Digital Radiography System A SPECIAL REPORT
How-To Evaluate a Veterinary Digital Radiography System A SPECIAL REPORT INTRODUCTION The more information you have, the easier decisions are to make. Experiencing a live hands-on demonstration will take
More informationCan Multimodal Real Time Information Systems Induce a More Sustainable Mobility?
1 Can Multimodal Real Time Information Systems Induce a More Sustainable Mobility? José Pedro Ramalho Veiga Simão University of Applied Sciences and Arts of Southern Switzerland SUPSI Institute for Applied
More informationThe product website contains useful information and videos that cover both the patient and the clinician interfaces for mycopd
mycopd universal guidance The product website contains useful information and videos that cover both the patient and the clinician interfaces for mycopd https://mymhealth.com/mymhealth/mycopd The clinician
More informationInternal Consistency and Reliability of the Networked Minds Measure of Social Presence
Internal Consistency and Reliability of the Networked Minds Measure of Social Presence Chad Harms Iowa State University Frank Biocca Michigan State University Abstract This study sought to develop and
More informationFlu season. Making the most of online appointments. August 2018
Flu season Making the most of online appointments August 2018 Dear colleagues, Over the last four years GP Online Services have been implemented by practices across England. Over 14 million patients -
More informationKinomap Trainer app is set for fitness machines including exercise bikes, ellipticals and cross trainers, treadmills and rowers.
Kinomap Trainer app is set for fitness machines including exercise bikes, ellipticals and cross trainers, treadmills and rowers. Version 1.1 1 With Kinomap Fitness, ride more than 100,000 km of geolocated
More informationIssues in Information Systems
ANALYZING THE ROLE OF SOME PERSONAL DETERMINANTS IN WEB 2.0 APPLICATIONS USAGE Adel M. Aladwani, Kuwait University, adel.aladwani@ku.edu.kw ABSTRACT This study examines the personal determinants of Web
More informationUser Manual CentrePoint Data Hub
User Manual CentrePoint Data Hub CentrePoint Data Hub Revision: 0 Released: 07//07 User Manual CentrePoint Data Hub CentrePoint Data Hub Revision: 0 Released: 07//07 Contents Overview Getting Started Assigning
More informationData Management, Data Management PLUS User Guide
Data Management, Data Management PLUS User Guide Table of Contents Introduction 3 SHOEBOX Data Management and Data Management PLUS (DM+) for Individual Users 4 Portal Login 4 Working With Your Data 5 Manually
More informationData Management System (DMS) User Guide
Data Management System (DMS) User Guide Eversense and the Eversense logo are trademarks of Senseonics, Incorporated. Other brands and their products are trademarks or registered trademarks of their respective
More informationCHAPTER 3 RESEARCH METHODOLOGY. In this chapter, research design, data collection, sampling frame and analysis
CHAPTER 3 RESEARCH METHODOLOGY 3.1 Introduction In this chapter, research design, data collection, sampling frame and analysis procedure will be discussed in order to meet the objectives of the study.
More informationEDUCATIONAL TECHNOLOGY MAKING AUDIO AND VIDEO ACCESSIBLE
EDUCATIONAL TECHNOLOGY MAKING AUDIO AND VIDEO ACCESSIBLE Videos integrated in courses must be accessible by all users. An accessible video includes captions, that is a transcript of the audio description
More informationGive a Meal Team Challenge Toolkit
Give a Meal Team Challenge Toolkit PARTICIPANT GUIDE Welcome to Give A Meal Team Challenge! We re so excited that you have joined Give A Meal Team Challenge to help fight hunger in your community. Your
More informationmehealth for ADHD Parent Manual
mehealth for ADHD adhd.mehealthom.com mehealth for ADHD Parent Manual al Version 1.0 Revised 11/05/2008 mehealth for ADHD is a team-oriented approach where parents and teachers assist healthcare providers
More informationINVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND
INVESTIGATING THE ADOPTION AND USE OF CONSUMER INTERNET TELEPHONY IN THAILAND Alexander M. Janssens Siam University Bangkok, Thailand research@alexanderjanssens.com ABSTRACT This research investigates
More informationUndertaking statistical analysis of
Descriptive statistics: Simply telling a story Laura Delaney introduces the principles of descriptive statistical analysis and presents an overview of the various ways in which data can be presented by
More informationMy Fitness Pal Health & Fitness Tracker A User s Guide
My Fitness Pal Health & Fitness Tracker A User s Guide By: Angela McCall Introduction My Fitness Pal is an online diet, health, and fitness tracker that allows you to track your nutrition and fitness goals
More informationthe best of care Managing diabetes with the FORA Diamond MINI and tools from Discovery Health Medical Scheme
the best of care 2014 Managing diabetes with the FORA Diamond MINI and tools from Discovery Health Medical Scheme contents What this document is about This document gives an overview of the FORA Diamond
More informationPerceived usefulness. Intention Use E-filing. Attitude. Ease of use Perceived behavioral control. Subjective norm
Project Guidelines Perceived usefulness Attitude Intention Use E-filing Ease of use Perceived behavioral control Subjective norm Introduction Introduction should include support/justification why the research
More informationApp user guide. resound.com
App user guide resound.com Introduction The ReSound apps are made to enhance your hearing experience and enable you to get more out of your ReSound hearing aids. ReSound s innovative sound technology and
More information3Shape TRIOS Orthodontics Impress your patients
3shape.com About 3Shape 3Shape is changing dentistry together with dental professionals across the world by developing innovations that provide superior dental care for patients. Our portfolio of 3D scanners
More informationMy Review of John Barban s Venus Factor (2015 Update and Bonus)
My Review of John Barban s Venus Factor (2015 Update and Bonus) December 26, 2013 by Erin B. White 202 Comments (Edit) This article was originally posted at EBWEIGHTLOSS.com Venus Factor is a diet program
More informationAudit Firm Administrator steps to follow
Contents Audit Firm Administrator steps to follow... 3 What to know before you start... 3 Understanding CaseWare Cloud in a nutshell... 3 How to do the once off set up for the Audit Firm or Organisation...
More informationConnectivity guide for ReSound Smart 3D app
Connectivity guide for ReSound Smart 3D app Table of contents Introduction to ReSound Smart Hearing Aids... 3 Mobile Devices that Work with ReSound Smart Hearing Aids... 3 Connectivity and ReSound Smart
More informationUser Acceptance of E-Government Services
User Acceptance of E-Government Services PACIS 2007 Track (Human Computer Interaction, Social and Cultural Aspects of IS) (Full Paper) Abstract In order to provide more accessible, accurate, real-time
More informationInstruction Manual Wellness Coach - Sleep
Instruction Manual Wellness Coach - Sleep V1.4 JUNE 2018 TABLE OF CONTENTS INSTALL THE MOBILE APP WELLNESS COACH SLEEP...4 LOGIN TO WELLNESS COACH SLEEP...5 Login with a Wellness Coach Health account...5
More informationFUNDRAISING GUIDE. Make A Difference. walktocurearthritis.org. #WalkToCureArthritis
FUNDRAISING GUIDE ONE Can Make A Difference walktocurearthritis.org #WalkToCureArthritis Welcome to the Walk to Cure Arthritis Walk to Cure Arthritis is the largest arthritis gathering in the world, celebrating
More informationThe SEVEN TOUCHES PROGRAM
The SEVEN TOUCHES PROGRAM Connects you to success National Association of Insurance and Financial Advisors Background: the seven touches The Seven Touches of Membership (Seven Touches) is based on a study
More informationQualitative and Quantitative Approaches Workshop. Comm 151i San Jose State U Dr. T.M. Coopman Okay for non-commercial use with attribution
Qualitative and Quantitative Approaches Workshop Comm 151i San Jose State U Dr. T.M. Coopman Okay for non-commercial use with attribution This Workshop This is a research skill workshop. This workshop
More informationInternal Consistency and Reliability of the Networked Minds Social Presence Measure
Internal Consistency and Reliability of the Networked Minds Social Presence Measure Chad Harms, Frank Biocca Iowa State University, Michigan State University Harms@iastate.edu, Biocca@msu.edu Abstract
More informationYour Dental Benefits. The Local Choice Dental Benefits Program
Your Dental Benefits The Local Choice Dental Benefits Program Welcome to Delta Dental of Virginia In addition to the largest network of dentists in Virginia* and valuable benefits that help keep your out-of-pocket
More information3Shape TRIOS Orthodontics. Impress your patients
3Shape TRIOS Orthodontics Impress your patients Keep improving with TRIOS Orthodontics Going digital with your orthodontic practice means that you are more efficient, more precise and your patients more
More informationUser Instruction Guide
User Instruction Guide Table of Contents Logging In and Logging Out of MMSx 1 Creating a TPN (Terminal Profile Number) 2 Single Merchant 2 From Navigation Bar 2 From Home Page Link 4 Multiple Merchants
More informationWe, at Innovatech Group, have designed xtrack, an easy-to-use workout application that tracks the fitness progress of the user, asking the user to
2 We, at Innovatech Group, have designed xtrack, an easy-to-use workout application that tracks the fitness progress of the user, asking the user to input information before and after each workout session.
More information...better to use a lock screen than to worry about saving a few seconds of time : Effect of Fear Appeal in the Context of Smartphone Locking Behavior
...better to use a lock screen than to worry about saving a few seconds of time : Effect of Fear Appeal in the Context of Smartphone Locking Behavior Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore
More informationOverview. Video calling today. Who we are 8/21/12. Video Quality and Interoperability across Videophones Today and in the Future
Overview Video Quality and Interoperability across Videophones Today and in the Future Christian Vogler and Norman Williams Technology Access Program, Gallaudet University Who we are The state of video
More informationRealtime A Cost-Effective Solution
Realtime A Cost-Effective Solution Realtime - A Cost-Effective Solution In April 2013, NCRA was invited by Judge David A. Nuffer to participate in choosing the most tech-savvy and cost-effective solution
More informationHuman Research Participant Protection Program
Human Research Participant Protection Program Guidance on IRB Review of International Research Issued: 6/3/14 I. Subject: Research conducted by Cornell University investigators outside of the United States
More informationSoftware Version 2.0. User s Guide
Software Version 2.0 User s Guide Table of Contents Contents Contents Important Information About Your FreeStyle Auto-Assist Software...1 Intended Use...1 System Requirements...1 Connecting to your Abbott
More informationMust be the music: Validation of a theory-based survey
Must be the music: Validation of a theory-based survey Brian C. Gordon, PhD, 1 Michael A. Perko, PhD, 2 Lori W. Turner, PhD, 1 James D. Leeper, PhD, 3 Samory T. Pruitt, PhD, 4 and Stuart L. Usdan, PhD
More informationData-driven hearing care with time-stamped data-logging
Data-driven hearing care with time-stamped data-logging NIELS HENRIK PONTOPPIDAN 1,*, XI LI 1, LARS BRAMSLØW 1, BENJAMIN JOHANSEN 1,2, CLAUS NIELSEN 1, ATEFEH HAFEZ 1, AND MICHAEL KAI PETERSEN 1, 2 1 Eriksholm
More informationMNSCREEN TRAINING MANUAL Hospital Births Newborn Screening Program October 2015
MNSCREEN TRAINING MANUAL Hospital Births Newborn Screening Program October 2015 CONTENTS PART 1: GETTING STARTED... 2 Logging In... 2 Access for New Hires... 2 Reporting Refusals... 3 Adding Patient Records...
More informationProteome Discoverer Version 1.3
Xcalibur Proteome Discoverer Version 1.3 Installation Guide XCALI-97359 Revision A May 2011 2011 Thermo Fisher Scientific Inc. All rights reserved. Xcalibur is a registered trademark of Thermo Fisher Scientific
More informationOverview, page 1 Shortcut Keys for Cisco Unity Connection Administration, page 1 Other Unity Connection Features, page 4
Overview, page 1 Shortcut Keys for Cisco Unity Connection Administration, page 1 Other Unity Connection Features, page 4 Overview Cisco Unity Connection supports various shortcut s and features that provides
More informationAn Overview of ProviderConnect. For Applied Behavior Analysis (ABA) Providers
An Overview of ProviderConnect For Applied Behavior Analysis (ABA) Providers ABA and ProviderConnect ProviderConnect is an easy-to-use online application that providers can use to complete everyday service
More informationLiteLink mini USB. Diatransfer 2
THE ART OF MEDICAL DIAGNOSTICS LiteLink mini USB Wireless Data Download Device Diatransfer 2 Diabetes Data Management Software User manual Table of Contents 1 Introduction... 3 2 Overview of operating
More informationBroadband and Deaf People. Discussion Paper
Broadband and Deaf People Discussion Paper What is a Discussion Paper? A discussion paper is a document that is sent to the Deaf community, for you to read and think about things that are in this Discussion
More informationKaren Hirt General Assembly June GoVax IMMUNIZATION RECORDS COMPROBANTE DE IMMUNIZACIÓN. Mobile Manager for Immunization & Travel Vaccines
Karen Hirt General Assembly June 2018 GoVax IMMUNIZATION RECORDS COMPROBANTE DE IMMUNIZACIÓN Mobile Manager for Immunization & Travel Vaccines GoVax Travel vaccines and immunization manager for individuals
More informationOptimal Flow Experience in Web Navigation
Optimal Flow Experience in Web Navigation Hsiang Chen, Rolf T. Wigand and Michael Nilan School of Information Studies, Syracuse University Syracuse, NY 13244 Email: [ hchen04, rwigand, mnilan]@mailbox.syr.edu
More informationHow Doctors Feel About Electronic Health Records. National Physician Poll by The Harris Poll
How Doctors Feel About Electronic Health Records National Physician Poll by The Harris Poll 1 Background, Objectives, and Methodology New research from Stanford Medicine, conducted with The Harris Poll
More informationPatient Online Flu Clinic campaign for GP practices
Patient Online Flu Clinic campaign for GP practices WebEx recording This presentation has been recorded as a WebEx. The webinar lasts for 33 minutes and shares lots of ideas as to how you can create one
More information