Jun 23, 2015 | Research library
This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add...
Jun 14, 2015 | Research library
We explore the risks to security and privacy in IoT networks by setting up an inexpensive home automation network and performing a set of experiments intended to study attacks and defenses. We focus on privacy preservation in home automation networks but our insights...
Jun 8, 2015 | Research library
The purpose of the study was twofold: to investigate the correlation between a sample of personal psychological and demographic factors and resistance to phishing; and to investigate if national culture moderates the strength of these correlations. Intention to resist...
Jun 4, 2015 | Research library
Users are more likely to respond to trustworthy and credible risk indicators that align with the threats they wish to evade. Security measures that frequently yield false positives erode the credibility of security protocols and condition users to disregard them. To...
Jun 1, 2015 | Research library
This research investigates the link between social media phishing susceptibility and individual Facebook habits, particularly how these habits lead to victimization and its relation to email-based phishing. The study analyzes the precursors and effects of email habits...
May 31, 2015 | Research library
The state of advice given to people today on how to stay safe online has plenty of room for improvement. Too many things are asked of them, which may be unrealistic, time consuming, or not really worth the effort. To improve the security advice, our community must...