Aug 30, 2015 | Research library
This study investigates the roles of social influence and personal preference in users’ social media adoption behavior, proposing sociability as a criterion to classify social media. The study examines the determinants of usage intention across social media with...
Aug 13, 2015 | Research library
A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not...
Aug 13, 2015 | Research library
An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...
Aug 10, 2015 | Research library
This paper discusses the involvement of CEOs in cyber security. Backed up by strong research, it explores the current state of CEO involvement, addresses some of the challenges involved in CEO involvement and offers four golden rules of cyber security....
Aug 10, 2015 | Research library
This paper is the outcome of a study which explores the state of two-factor authentication (2FA), specifically focussing on the largest existing 2FA service, offered by Google.
Aug 7, 2015 | Research library
The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is...