Dec 14, 2015 | Research library
Wireless sensor networks have been increasingly popular and they have been deployed in a wide range of areas including transportation system, healthcare, robotics, and smart home. Wireless sensor networks have facilitated our life using the remote sensing ability....
Dec 9, 2015 | Research library, Whitepaper
Improving cyber security awareness is often assumed to improve cyber security, however this paper suggests it’s necessary for people to be engaged in cyber security in order to make people a robust cyber defence. The paper builds a model for engaging people in...
Dec 7, 2015 | Research library
One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. Despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses...
Dec 1, 2015 | Research library
Taking into account the increasing need for online data protection and the availability of numerous Privacy Enhancing Technologies (PETs) for internet and mobile users, ENISA conducted, under its 2015 work programme, a study on online privacy tools, aiming at...
Dec 1, 2015 | Research library
A substantial proportion of security breaches stem from human factors, necessitating their consideration alongside technical elements. Scholars propose that a security culture fosters suitable employee behaviors leading to compliance. Consequently, organizations...
Oct 1, 2015 | Research library
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how...