Jan 1, 2010 | Research library
Nowadays, information becomes a very valuable thing that is owned by every individual, organization or company. Various efforts are made to maintain the security of information owned. There are still many people who pay less attention to the danger or threat to the...
Jan 1, 2010 | Research library
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishing susceptibility and the effectiveness of several anti- phishing educational materials....
Jan 1, 2010 | Research library
Employee violations of IS security policies is recognized as a key concern for organizations. Although interest in IS security has risen in recent years, little empirical research has examined this problem. To address this research gap, this dissertation identifies...
Jan 1, 2010 | Research library
This article reports human memories as reconstructed fragments of information, as opposed to recorded feedback. According to the article false memories are easily recalled, jeopardising eyewitness reports. Eyewitness reports should therefore perhaps be used with...
Dec 26, 2009 | Journal article, Research library
End users are frequently criticised as the sources of bad security practice, and it is suggested they might take the issue more seriously if they experienced a breach. An option for enabling this would be for security administrators to deliberately create conditions...
Dec 19, 2009 | Research library
By using the protection motivation theory, this article tests a model of password protection intentions for online users. Hypotheses are proposed concerning the intention to engage in good password practices. Data were collected from 182 college students of 3...