Apr 6, 2015 | Research library
This study aims to analyze the components of user experiences that cultivate trust and incite distrust on the internet, with a specific focus on the characteristics of websites that bolster trust or provoke distrust. We gathered data on users’ experiences during...
Mar 15, 2015 | Research library
Traditionally, organizations manage information security through policies and mechanisms that employees are expected to comply with. Noncompliance with security is regarded as undesirable, and often sanctions are threatened to deter it. But in a recent study, we...
Mar 14, 2015 | Research library
Fear appeals, which are used widely in information security campaigns, have become common tools in motivating individual compliance with information security policies and procedures. However, empirical assessments of the effectiveness of fear appeals have yielded...
Feb 26, 2015 | Research library
As the fields of HCI, cybersecurity and psychology continue to grow and diversify there is greater overlap between these areas and new opportunities for interdisciplinary collaboration. This paper argues for a focus specifically on the role of social psychology in...
Feb 25, 2015 | Research library
This paper’s researchers studied the concept of retrieval-induced forgetting in children. Researchers found that while actual memories were indeed subject to retrieval-induced forgetting, false meories were not. The finding suggests cue indepedence – the idea of...
Feb 12, 2015 | Research library
While individual differences in decision-making have been examined within the social sciences for several decades, this research has only recently begun to be applied by computer scientists to examine privacy and security attitudes (and ultimately behaviors)....