Aug 6, 2010 | Research library
The insider threat is undeniable. The first step in addressing this issue is to evaluate the potential for such threats. Merely technical solutions are not adequate as insider threats primarily stem from human factors. Hence, it is imperative to adopt a three-tiered...
Aug 1, 2010 | Research library
Protecting information from a wide variety of security threats is an important and sometimes daunting organizational activity. Instead of relying solely on technological advancements to help solve human problems, managers within firms must recognize and understand the...
Jul 25, 2010 | Research library
Many organizations recognize that their employees, who are often considered the weakest link in information security, can also be great assets in the effort to reduce risk related to information security. Since employees who comply with the 1 Mikko Siponen was the...
Jul 14, 2010 | Research library
Despite the advent of sophisticated authentication systems, text-based passwords remain the most widely adopted method of securing information systems. Seizing a unique opportunity that arose following a substantial shift in Carnegie Mellon University’s (CMU)...
Jul 3, 2010 | Research library
In order to improve current security solutions or devise novel ones, it is important to understand users’ knowledge, behaviour, motivations and challenges in using a security solution. However, achieving this understanding is challenging because of the limitations of...
Jul 3, 2010 | Research library
This study aims to understand the IT threat avoidance behaviors of personal computer users. We tested a research model derived from Technology Threat Avoidance Theory (TTAT) using survey data. We find that users’ IT threat avoidance behavior is predicted by avoidance...