Nov 14, 2006 | Research library
This paper emphasizes that an information security solution is a crucial element for any organization. One of the main challenges in integrating information security into an organization is the actions and behaviors of employees. For information security to become...
Jul 26, 2006 | Research library
This study reports on what everday user do when they come across suspicious emails. An analysis suggests people can manage risks they’re familiar with but are unable to extrapolate their strategies to deal with unfamiliar risks.
Jul 15, 2006 | Conference proceedings, Research library
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability;...
Jun 9, 2006 | Research library
Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study...
Apr 10, 2006 | Research library
With its global reach and pervasiveness, the Internet enables individuals to be more connected through electronic linkages than ever before. In such a highly inter-dependent network, individual behaviors can have far-reaching consequences that transcend borders...
Jan 27, 2006 | Research library
Holding a strong goal intention (“I intend to reach Z!”) does not guarantee goal achievement, because people may fail to deal effectively with self‐regulatory problems during goal striving. This review analyzes whether realization of goal intentions is facilitated by...