Jan 9, 2007 | Journal article, Research library
This article examines the social psychological theories and research that can be used to design better behaviour interventions. Although the paper focuses on health, the review could be applied in a wide variety of contexts – cyber security included....
Jan 9, 2007 | Journal article, Research library
This paper discusses moral disengagement, with an emphasis on how moral disengagement impedes ecological sustainability. The author notes moral disengagement comes about through: exonerative comparisons that render detrimental practices as righteous; the use of...
Jan 8, 2007 | Research library
It is widely agreed that a key threat to information security is caused by careless employees who do not adhere to the information security policies of their organizations. In order to ensure that employees comply with the organization’s information security...
Jan 1, 2007 | Research library
This study is a large scale investigation of trust manipulation tactics used by phishing web sites and email messages. The experiment focuses on media authenticity evaluations, rather than content credibility with the assumption that its authors are known. It tests...
Jan 1, 2007 | Research library
The concept of an ‘information security culture’ is relatively new. A review of published research on the topic suggests that it is not the information security panacea that has been suggested. Instead it tends to refer to a range of existing techniques...
Dec 1, 2006 | Research library
The key threat to IS security is constituted by careless employees who do not comply with IS security policies. To ensure that employees comply with organizations’ IS security procedures, a number of IS security policy compliance means have been proposed in the...