Feb 17, 2010 | Research library
This study aims to understand the factors that influence college students to use anti-spyware tools, with the goal of informing future students about the spyware epidemic and ways to combat it. The research involved structured interviews and a survey, revealing...
Feb 16, 2010 | Book, Research library
According to this book’s authors, we need only understand how our minds work to unlock shortcuts that can lead to long term behavour change. This book explores how our minds work and some shortcuts that might be of use when seeking to change human behaviour....
Feb 15, 2010 | Research library
As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved through technical...
Feb 1, 2010 | Research library
The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical...
Feb 1, 2010 | Research library
This paper primarily focuses on information security, specifically examining compliance with information security policies. The author questions the seemingly insignificant relationship between rewards and actual compliance with these policies, suggesting that this...
Jan 28, 2010 | Research library
This article examines the impact of negative message framing on security technology adoption. Based on previous studies, it was hypothesized that negatively-framed messages would have a greater effect on the adoption of security technologies which detect system abuse...