Jan 25, 2009 | Research library
This research aims to identify the factors that drive an employee to comply with requirements of the Information Security Policy (ISP) with regard to protecting her organization’s information and technology resources. Two different research models are proposed for an...
Jan 23, 2009 | Research library
It is becoming increasingly apparent that people are in fact the main weakness in regards to the protection of data. This paper explores in detail the areas in which personal details and sensitive data are socially engineered. The study investigated people’s...
Jan 10, 2009 | Research library
This comprehensive review seeks to report on fraud in a wide variety of forms, with a particular focus on mass marketing, identity and small business fraud. It finds fraud is often innovative, comes in a wide variety of forms and that fraudsters use a combination of...
Jan 9, 2009 | Journal article, Research library
Principal Microsoft Researcher Cormac Herley argues users’ rejection of security procedures is often entirely rational as the expected benefits of following security advice are often outweighed by the expected costs.
Jan 9, 2009 | Research library
This article explores the application of theories and methodologies from behavioural economics and behavioural decision research to investigate privacy decision making.
Jan 2, 2009 | Research library
PhishGuru is an embedded training system that teaches users to avoid falling for phishing attacks by delivering a training message when the user clicks on the URL in a simulated phishing email. In previous lab and real-world experiments, we validated the effectiveness...