Jul 9, 2015 | Research library
Information Security (IS) is one of the biggest concerns for many organizations. This concern has led many to focus a huge effort into studying different IS areas. One of these critical areas is the human aspect, where investigation of employees’ behaviors has...
Jul 8, 2015 | Research library
In this paper, a role play scenario experiment of people’s ability to differentiate between phishing and genuine emails demonstrated limitations in the generalisability of phishing studies. This involves issues around the priming of participants and the...
Jul 4, 2015 | Research library
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and...
Jul 1, 2015 | Research library
Standards and best practices for information security awareness programs focus on the content and processes of the programs, without taking into consideration how individuals internalize security-related information and how individuals make security related decisions....
Jul 1, 2015 | Research library
This article delves into the persistent issue of individuals neglecting basic cybersecurity measures, despite the increasing reports of losses from security breaches. It emphasizes the importance of understanding the psychological factors that encourage users to adopt...
Jun 24, 2015 | Blogpost, Research library
This short blog post suggests cyber security awareness campaigns should not be run by IT but by human resources or standalone departments; that companies should quantify risks to guide cyber security investments; that awareness campaign effectiveness should be...