Follow
Ruth Shillair, Ph.D.
Title
Cited by
Cited by
Year
Getting grandma online: are tablets the answer for increasing digital inclusion for older adults in the US?
HS Tsai, R Shillair, SR Cotten, V Winstead, E Yost
Educational gerontology 41 (10), 695-709, 2015
2802015
Social support and “playing around” an examination of how older adults acquire digital literacy with tablet computers
HS Tsai, R Shillair, SR Cotten
Journal of Applied Gerontology 36 (1), 29-55, 2017
2712017
Online safety begins with you and me: Convincing Internet users to protect themselves
R Shillair, SR Cotten, HYS Tsai, S Alhabash, R LaRose, NJ Rifon
Computers in Human Behavior 48, 199-207, 2015
2412015
Cybersecurity capacity: does it matter?
WH Dutton, S Creese, R Shillair, M Bada
Journal of Information Policy 9, 280-306, 2019
492019
Senior technology exploration, learning, and acceptance (STELA) model: from exploration to use–a longitudinal randomized controlled trial
HYS Tsai, RV Rikard, SR Cotten, R Shillair
Educational Gerontology 45 (12), 728-743, 2019
362019
Protection motivation theory
R Shillair
The international encyclopedia of media psychology, 1-3, 2020
292020
Not so lonely surfers: Loneliness, social support, internet use and life satisfaction in older adults
RJ Shillair, RV Rikard, SR Cotten, HY Tsai
Iconference 2015 proceedings, 2015
242015
Cybersecurity capacity-building: cross-national benefits and international divides
S Creese, WH Dutton, P Esteve-González, R Shillair
Journal of Cyber Policy 6 (2), 214-235, 2021
212021
Cybersecurity Education, Awareness Raising, and Training Initiatives: National Level Evidence-Based Results, Challenges, and Promise
R Shillair, P Esteve-González, WH Dutton, S Creese, E Nagyfejeo, ...
Computers & Security 119, 102756, 2022
182022
Bringing older consumers onboard to online banking: a generational cohort comparison
M Jiang, NJ Rifon, SR Cotten, S Alhabash, HYS Tsai, R Shillair, ...
Educational Gerontology 48 (3), 114-131, 2022
172022
An exploratory analysis of the characteristics of ideologically motivated cyberattacks
TJ Holt, JR Lee, JD Freilich, SM Chermak, JM Bauer, R Shillair, A Ross
Terrorism and political violence 34 (7), 1305-1320, 2022
152022
Using machine learning to examine cyberattack motivations on web defacement data
S Banerjee, T Swearingen, R Shillair, JM Bauer, T Holt, A Ross
Social Science Computer Review 40 (4), 914-932, 2022
142022
How does home ownership affect migrants’ sense of relative deprivation? An investigation based on field theory
D Liu, S Shen, R Shillair, F Li, Z Chen
Social Science & Medicine 306, 115097, 2022
102022
Supporting a cybersecurity mindset: getting internet users into the cat and mouse game
R Shillair, WH Dutton
Available at SSRN 2756736, 2016
102016
Not so Lonely Surfers: Loneliness, Social Support, Internet Use and Life Satisfaction in Older Adults, Iconference 2015 Proceedings. iSchools
RJ Shillair, RV Rikard, SR Cotten, HY Tsai
82015
Talking about online safety: a qualitative study exploring the cybersecurity learning process of online labor market workers
R Shillair
Proceedings of the 34th ACM International Conference on the Design of …, 2016
72016
The political outcomes of unfriending: social network curation, network agreeability, and political participation
C Robertson, L Fernandez, R Shillair
Quello Center Working Paper, TPRC47: The 47th Research Conference on …, 2019
42019
Multiple sources for security: seeking online safety information and their influence on coping self-efficacy and protection behavior habits
R Shillair, J Meng
42017
Multiple sources for security: The influence of source networks on coping self-efficacy and protection behavior habits in online safety
R Shillair, J Meng
Proceedings of the 50th Hawaii International Conference on System Sciences …, 2017
42017
Mind the Gap: Perceived Self-Efficacy, Domain Knowledge and Their Effects on Responses to a Cybersecurity Compliance Message
RJ Shillair
Michigan State University, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20