Mar 1, 2011 | Research library
This study evaluated the digital skills of 25,000 European internet users aged 9-16 by examining their online activities, skills, and self-efficacy. It was found that the range of digital skills is linked to the variety of online activities. However, many children in...
Feb 1, 2011 | Research library
Deterrence theory is one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies. Based on the rational choice view of human behavior, the theory predicts that illicit behavior can be...
Feb 1, 2011 | Research library
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis...
Feb 1, 2011 | Research library
We examine the cost for an attacker to pay users to execute arbitrary code—potentially malware. We asked users at home to download and run an executable we wrote without being told what it did and without any way of knowing it was harmless. Each week, we increased the...
Jan 19, 2011 | Research library
Traditional typologies of consumer privacy concern suggest that consumers fall into three distinct groups: One-fourth of consumers are not concerned about privacy, one-fourth are highly concerned, and half are pragmatic, in that their concerns about privacy depend on...
Jan 15, 2011 | Conference proceedings, Research library
Cyber security and the role employees play in securing information are major concerns for businesses. The aim of this research is to explore employee security behaviours and design interventions that can motivate behaviour change. Previous research has focused on...