Jan 9, 2008 | Journal article, Research library
As the paper’s prescriptive title suggests, the authors find linking a message to any important values an individual might hold increases the effectiveness of a message – which is likely to be of use when a message has little or no personal relevance to an...
Jan 9, 2008 | Journal article, Research library
Researchers studied the effectiveness of web browser phishing warnings by targeting 60 study participants with simulated email phishing attacks. 97% of study participants clicked a link in at least one simulated phishing email. When then presented with a passive web...
Jan 9, 2008 | Research library
Objective: Without standardized definitions of the techniques included in behavior change interventions, it is difficult to faithfully replicate effective interventions and challenging to identify techniques contributing to effectiveness across interventions. This...
Jan 1, 2008 | Research library
Theory provides a helpful basis for designing interventions to change behaviour but offers little guidance on how to do this. This paper aims to illustrate methods for developing an extensive list of behaviour change techniques (with definitions) and for linking...
Jan 1, 2008 | Research library
Recent reports indicate a shortage of approximately 20,000- 30,000 qualified cyber-security specialists in the US Public Sector alone despite being one of the best financially compensated technology-related domains. Against ever evolving cyber-threats the need to...
Jan 1, 2008 | Research library
SoHo users are increasingly faced with the dilemma of applying appropriate security mechanisms to their computer with little or no knowledge of which countermeasure will deal with which potential threat. As problematic as it may seem for individuals to apply...