scispace - formally typeset
M

Marijn Martens

Researcher at Ghent University

Publications -  11
Citations -  104

Marijn Martens is an academic researcher from Ghent University. The author has contributed to research in topics: Computer science & Data Protection Act 1998. The author has an hindex of 3, co-authored 8 publications receiving 55 citations.

Papers
More filters
Journal ArticleDOI

Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general

TL;DR: Investigating the motivations to protect oneself against scams, malware and cybercrime in general using an adjusted model of the protection motivation theory (PMT), which includes subjective norm, threat and coping awareness found subjective norm to be an important predictor in the intention toward protecting against all cybercrimes.
Journal ArticleDOI

Mapping the Mobile DNA of News. Understanding Incidental and Serendipitous Mobile News Consumption

TL;DR: In this article, the authors examine how users understand serendipity in mobile news consumption and whether this is a good or bad sign for the future of mobile news. But,
Journal ArticleDOI

Children’s reflections on privacy and the protection of their personal data: A child-centric approach to data protection information formats

TL;DR: Participatory research with young children in two public primary schools in the city of Ghent, Belgium provides insight into children’s ideas and views about privacy and data protection, and reports on a number of children”s recommendations on how exactly information about privacy or data protection should be provided to them.

How do people use their smartphone? A data scientific approach to describe and identify user-related, system-related and context-related patterns in use

TL;DR: In this paper, the authors present a series of analyses from a large corpus of over 3000 users that combine data-driven and theory-driven analyses to identify reliable smartphone usage patterns and clusters of similar users, and compare the stability of user clusters across userand system-initiated sessions, as well as during the hypothesized ritualized behavior times directly before and after sleeping.