Jan 25, 2010 | Research library
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee’s security compliance in the workplace. Two factors were proposed as the antecedents of employees’ security compliance: ISP Fairness and ISP Quality. ISP...
Jan 11, 2010 | Research library
Two online experiments examine the effects of different e-commerce deception tactics on decision-making. The study finds consumers’ product choices are influenced by manipulation of product details and the order in which products are displayed, and concludes consumers...
Jan 10, 2010 | Research library
This paper discusses the paradox where computer users, despite being aware of spyware, often do not take measures to protect against it. A recent study delves into the reasons behind this indifference, suggesting that enhancing users’ confidence in installing...
Jan 9, 2010 | Journal article, Research library
In this study, participants performed a computer memory task while compliance to three safety measures was monitored. Compling with indirect warnings – that is, warnings triggered by entities other than researchers – was not significantly different to compliance with...
Jan 9, 2010 | Research library
This paper proposes a research method that investigates the risk perceptions of computer endusers relating to organisational Information Security (InfoSec) and the situational factors that influence these perceptions. This method uses the Repertory Grid Technique...
Jan 1, 2010 | Research library
The application of information security technologies do not always result in improved security. Human factors play a significant role in computer security; factors such as individual difference, cognitive abilities and personality traits can impact on behaviour....