default search action
Ali Farooq 0001
Person information
- affiliation: University of Turku, Turku, Finland
Other persons with the same name
- Ali Farooq 0002 — Pakistan Institute of Engineering & Technology, Multan, Pakistan
- Ali Farooq 0003 — Indiana University-Purdue University Indianapolis, IN, USA
- Ali Farooq 0004 — UET Lahore, Pakistan
- Ali Farooq 0005 — University of Strathclyde, Glasgow, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Uzma Kiran, Naurin Farooq Khan, Hajra Murtaza, Ali Farooq, Henri Pirkkalainen:
Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory. Comput. Secur. 149: 104204 (2025) - 2024
- [j7]Ali Farooq, Joni Salminen, Justin D. Martin, Kholoud Khalil Aldous, Soon-Gyo Jung, Bernard J. Jansen:
Exploring Social Media Privacy Concerns: A Comprehensive Survey Study Across 16 Middle Eastern and North African Countries. IEEE Access 12: 147087-147105 (2024) - [j6]Laila Dahabiyeh, Ali Farooq, Farhan Ahmad, Yousra Javed:
Explaining technology migration against the change in terms of use: an fsQCA approach. Inf. Technol. People 37(3): 1073-1102 (2024) - [j5]Ali Farooq, Laila Dahabiyeh, Yousra Javed:
When WhatsApp changed its privacy policy: explaining WhatsApp discontinuation using an enablers-inhibitors' perspective. Online Inf. Rev. 48(1): 22-42 (2024) - 2023
- [j4]Bilal Naqvi, Kseniia Perova, Ali Farooq, Imran Makhdoom, Shola Oyedeji, Jari Porras:
Mitigation strategies against the phishing attacks: A systematic literature review. Comput. Secur. 132: 103387 (2023) - [j3]Ali Farooq, Laila Dahabiyeh, Christian Maier:
Social media discontinuation: A systematic literature review on drivers and inhibitors. Telematics Informatics 77: 101924 (2023) - 2022
- [c12]Ali Farooq, Debora Jeske, Paul van Schaik, Michael Moran:
Voice Assistants: (Physical) Device Use Perceptions, Acceptance, and Privacy Concerns. I3E 2022: 485-498 - [c11]Ng Yee Jien, Mohammad Tahir, Mohammad Dabbagh, Kian Meng Yap, Ali Farooq:
Performance Evaluation of Machine Learning Algorithms for Intrusion Detection in IoT Applications. IICAIET 2022: 1-6 - 2021
- [j2]Saira Hanif Soroya, Ali Farooq, Khalid Mahmood, Jouni Isoaho, Shan-e Zara:
From information seeking to information avoidance: Understanding the health information behavior during a global health crisis. Inf. Process. Manag. 58(2): 102440 (2021) - [c10]Ali Farooq, Alina Dubinina, Seppo Virtanen, Jouni Isoaho:
Understanding Dynamics of Initial Trust and its Antecedents in Password Managers Adoption Intention among Young Adults. ANT/EDI40 2021: 266-274 - 2020
- [c9]Ali Farooq, Antti Hakkala, Seppo Virtanen, Jouni Isoaho:
Cybersecurity Education and Skills: Exploring Students' Perceptions, Preferences and Performance in a Blended Learning Initiative. EDUCON 2020: 1361-1369 - [c8]Samuli Laato, Henna Vilppu, Juho Heimonen, Antti Hakkala, Jari Björne, Ali Farooq, Tapio Salakoski, Antti Airola:
Propagating AI Knowledge Across University Disciplines- The Design of A Multidisciplinary AI Study Module. FIE 2020: 1-9 - [c7]Samuli Laato, Ali Farooq, Henri Tenhunen, Tinja Pitkamaki, Antti Hakkala, Antti Airola:
AI in Cybersecurity Education- A Systematic Literature Review of Studies on Cybersecurity MOOCs. ICALT 2020: 6-10 - [c6]Ali Farooq, Farhan Ahmad, Nyla Khadam, Birgy Lorenz, Jouni Isoaho:
The Impact of Perceived Security on Intention to use E-Learning Among Students. ICALT 2020: 360-364
2010 – 2019
- 2019
- [c5]Ali Farooq, Joshua Rumo Arongo Ndiege, Jouni Isoaho:
Factors Affecting Security Behavior of Kenyan Students: An Integration of Protection Motivation Theory and Theory of Planned Behavior. AFRICON 2019: 1-8 - [c4]Ali Farooq, Debora Jeske, Jouni Isoaho:
Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills Model. SEC 2019: 238-252 - 2016
- [c3]Ali Farooq, Lalitha Balakrishnan, Muneeroh Phadung, Seppo Virtanen, Johanna Isoaho, Dhan Prasad Poudel, Jouni Isoaho:
Dimensions of Internet Use and Threat Sensitivity: An Exploratory Study among Students of Higher Education. CSE/EUC/DCABES 2016: 534-541 - 2015
- [j1]Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Observations on Genderwise Differences among University Students in Information Security Awareness. Int. J. Inf. Secur. Priv. 9(2): 60-74 (2015) - [c2]Ali Farooq, Syed Rameez Ullah Kakakhel, Seppo Virtanen, Jouni Isoaho:
A taxonomy of perceived information security and privacy threats among IT security students. ICITST 2015: 280-286 - [c1]Ali Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho:
Information Security Awareness in Educational Institution: An Analysis of Students' Individual Factors. TrustCom/BigDataSE/ISPA (1) 2015: 352-359
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 19:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint