Sep 1, 2005 | Research library
Insider threat is widely recognised as an issue of utmost importance for IS security management. In this paper, we investigate the approach followed by ISO17799, the dominant standard in IS security management, in addressing this type of threat. We unfold the...
Jul 2, 2005 | Research library
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in...
May 29, 2005 | Research library
Although the research on software piracy is growing, criminologists have not examined the role of deterrence in software piracy. Using data collected from 382 undergraduate students attending a southeastern university, this study examined the role of deterrence in...
Mar 10, 2005 | Research library
This article outlines the process of developing a taxonomy of end user security-related behaviors, testing its consistency, and using it to conduct a U.S. survey on key end user behaviors. The study involved interviewing 110 individuals knowledgeable about end user...
Jan 26, 2005 | Research library
This study suggests Japanese and American people exhibit trust based on different things as the existence of a potential indirect relationship increased trust of outgroup members more for Japanese people than for Americans.
Jan 26, 2005 | Research library
This paper suggests technology can create a psychological distance between users that impacts four components of moral behaviour (sensitivity, judgment, motivation, and action). According to the paper, the psychological distance facilitates crimes like piracy and...