Sep 12, 2011 | Research library
This paper discusses the challenges faced by home computer users in the United States, most of whom have little computer security knowledge or training. Despite this, they regularly make security-related decisions, often unknowingly, guided by their “mental...
Sep 4, 2011 | Research library
Slowly but surely, academia and industry are fully accepting the importance of the human element as it pertains to achieving security and trust. Undoubtedly, one of the main motivations for this is the increase in attacks (e.g., social engineering and phishing) which...
Sep 3, 2011 | Research library
The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral...
Sep 1, 2011 | Research library
This study addresses cyberslacking, defined as the use of internet and mobile technology for personal purposes during work hours. It’s a growing concern for organizations due to potential lost revenue. The study, using a nationally representative sample of...
Aug 31, 2011 | Research library
Employees’ non-compliance with IS security procedures is a key concern for organizations. To tackle this problem, there exist several training approaches aimed at changing employees’ behavior. However, the extant literat ure does not examine the elementary...
Aug 15, 2011 | Research library
Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it an ideal tool through which awareness...