Aug 15, 2002 | Journal article, Research library
Personal information is scarce in computer-mediated communication. So when information about the sender is attached with his or her e-mail, this could induce a powerful effect toward the receptor. Two experiments were carried out where males and females were solicited...
Jan 9, 2001 | Journal article, Research library
This paper argues that simply blaming users for security breaches will not lead to more effective security systems and that security designers must address the causes of undesirable user behaviour to design effective security systems. Focusing on passwords in...
Jan 9, 2000 | Journal article, Research library
Recent behavioural research has debunked the idea of humans as entirely rational. This paper suggests the gap between human behaviour and human cognition can in fact be explained not necessarily by irrationality but by: performance errors; computational limitations;...
Dec 1, 1999 | Journal article, Research library
In the late 90’s, it was largely considered users were unmotivated and lazy when it came to cyber security. This UCL research suggested, actually, users compromised security systems through lack of security knowledge and non-user centric security mechanisms....
Jan 9, 1982 | Journal article, Research library
This paper discusses four studies that allowed the authors to develop and validate a scale measuring an individual’s ‘need for cognition’ (that is, an indivdual’s tendency to engage in thinking and enjoy the practice of thinking things through). Notably,...
Jan 9, 1974 | Journal article, Research library
People are often faced with making judgements base on what they believe will happen. This paper proposes said beliefs are largely born from heuristics, including representativeness, availability and anchoring.