May 31, 2011 | Research library
This paper contributes to the growing body of literature on privacy and security by looking at self-reported password sharing practices. 62 men and 60 women recruited through a combination of snowball sampling and small ads answered a series of open-ended questions...
May 31, 2011 | Research library
Employee non-compliance with information systems (IS) security procedures is a key concern for organizations. However, even though the importance of having effective IS security training is widely acknowledged by scholars and practitioners, the existing literature...
May 29, 2011 | Research library
As the number of individuals with email accounts continues to increase, so does the risk of unintentionally giving out sensitive information. Phishing has been described as a type of social engineering with the goal of gaining confidential or sensitive information...
May 27, 2011 | Journal article, Research library
The potential of 360-degree feedback in fostering behavioral and organizational change is well-recognized, but research on its effectiveness yields mixed results due to diverse design features. Four crucial characteristics for successful organizational change through...
May 20, 2011 | Research library
While past work has examined password usage on a specific computer, web site, or organization, there is little work examining overall password usage in daily life. Through a diary study, we examine all usage of passwords, and offer some new findings based on...
May 15, 2011 | Journal article, Research library
Security policies are required that protect information from unauthorised access, and also respect challenges users face in creating, and particularly managing, increasing numbers of passwords. This paper investigates real password use in the context of daily life. It...