Jan 15, 2012 | Research library
Behaviour change is difficult to achieve and there are many models identifying the factors to affect such change but few have been applied in the security domain. This paper discusses the use of serious games to improve the security behaviour of end-users. A new...
Jan 15, 2012 | Research library
Users’ mental models of security, though possibly incorrect, embody patterns of reasoning about security that lead to systematic behaviors across tasks and may be shared across populations of users. Researchers have identified widely held mental models of security,...
Jan 11, 2012 | Research library
Following a literature review, the paper’s authors built a measure of perceived deception in advertising. The measure was fuelled by perceived veracity and perceived ethic, and may allow marketing practioners to evaluate the percieved deception of marketing...
Jan 10, 2012 | Research library
Many organizations struggle with ineffective and/or inefficient access control, but these problems and their consequences often remain invisible to security decision-makers. Prior research has focused on improving the policy-authoring part of authorization and does...
Jan 10, 2012 | Research library
To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information...
Jan 9, 2012 | Book, Research library
In this book, Charles Duhigg draws on psychological and neurological research to introduce the concept of habit loops. According to the book, habits are formed when a cue that leads to a behaviour leads to a reward. Changing habits requires amending habit loops....