Oct 9, 2009 | Research library
The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors affecting end‐user security behaviors, specifically, compliance with security policies. The...
Sep 18, 2009 | Research library
With Rogers’ protection motivation theory as the theoretical framework, this study identified determinants of young adolescents’ level of privacy concerns, which, in turn, affects their resultant coping behaviors to protect privacy. Survey data from 144...
Aug 29, 2009 | Research library
Conventional wisdom is that phishing represents easy money. In this paper we examine the economics that underlie the phenomenon, and find a very different picture. Phishing is a classic example of tragedy of the commons, where there is open access to a resource that...
Aug 13, 2009 | Research library
Research focusing on educating users about phishing and identifying phishing emails, as opposed to using technology for prevention and detection. The research identified multiple problems, namely: that people were not motivated to learn about security; that security...
Aug 10, 2009 | Research library
This paper develops and tests a theoretical model of the incentive effects of penalties, pressures and perceived effectiveness of employee actions.
Aug 10, 2009 | Research library
This study examines the extent to which individuals seek confirming – or disconfirming – evidence, instead of actually testing a hypothesis. Results indicated that, often, individuals are unwilling (or unable) to test their hypotheses. ...