Jun 27, 2021 | Conference proceedings, Research library
The Capability-Opportunity-Motivation-Behavior (COM-B) model posits that individuals’ behavior can be understood by considering their capabilities, opportunities, motivation, and the interplay among these factors. This research aims to apply the COM-B model to...
Nov 10, 2017 | Conference proceedings, Research library
This study examined the relationship between perception of risk, organisational commitment, and Information Security Awareness (ISA), finding both organisational commitment and perception of personal risk to be significant predictors of ISA. Surprisingly, frequency of...
Jan 10, 2017 | Conference proceedings, Research library
By offering users a strong message of fear, a weak message of fear and no message of fear, the authors of this paper concluded messages of fear combined with behavioural advice on how to mitigate threats can increase security behavioural intentions.
Jul 19, 2014 | Conference proceedings, Research library
This paper addresses security and safety choices that involve a decision on the timing of an action. Examples of such decisions include when to check log files for intruders and when to monitor financial accounts for fraud or errors. To better understand how...
Jan 15, 2013 | Conference proceedings, Research library
While organizations are making a considerable effort to leverage formal and informal control mechanisms (e.g., policies, procedures, organizational culture) to improve security, their impact and effectiveness is under scrutiny as employees seldom comply with...
May 15, 2012 | Conference proceedings, Research library
Voting technologies have undergone intense scrutiny in recent years. In contrast, the human components of these socio-technical systems, including the policies and procedures that guide and bind behavior have received less attention. To begin to understand pollworker...