Jan 1, 2009 | Research library
One can readily find computer and network security courses in most computer science departments, but we are likely overly ambitious calling computer security a science. The profession certainly has the aspects of an art, and it is fair to call much of the work...
Jan 1, 2009 | Research library
Phishing is a growing phenomenon, which has not only caused billions in losses, but also has eroded consumer confidence in online transactions. To develop effective countermeasures, we need to understand how phishing e-mails exploit human vulnerabilities. We develop a...
Jan 1, 2009 | Research library
This paper emphasizes the growing global interconnectivity and reliance on information systems (IS) in multiple sectors such as business and government. As institutions become more globally linked and dependent on automated control systems, the vulnerability of these...
Dec 9, 2008 | Journal article, Research library
The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti-spyware tools when they are faced with security threats.
Dec 2, 2008 | Research library
In the new era of a ubiquitously networked world, security measures are only as good as their weakest link. Home computers with access to the Internet are one of the weaker links as they are typically not as well protected as computers in the corporate world....
Nov 21, 2008 | Research library
Recently, the role of human behavior has become a focal point in the study of information security countermeasures. However, few empirical studies have been conducted to test social engineering theory and the reasons why people may or may not fall victim, and even...