Jan 10, 2006 | Research library
This experiment revolved around a web-based survey, which presented a mix of 20 legitimate and illegitimate emails to participants. Researchers asked participants to classify emails as either legitimate or illegitimate and explain their rationale. The 179 participants...
Jan 8, 2006 | Research library
This paper puts forward the view that an individuals perception of the risks associated with information systems determines the likelihood and extent to which she or he will engage in risk taking behaviour when using a computer. It is suggested that this behavior can...
Jan 1, 2006 | Research library
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced in the last year an increase in frequency and diversity. While regular phishing attacks...
Jan 1, 2006 | Research library
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns that this increase in memorability could also lead to an increased susceptibility...
Dec 4, 2005 | Research library
Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the sociobehavioral perspective, as the behavior of home computer users on security issues is...
Sep 6, 2005 | Research library
Commonly, individuals are referred to as “the most fragile component” in the structure of system security by security specialists. Notorious hacker Kevin Mitnick stated that he seldom resorted to password cracking, finding it much easier to trick...