Oct 7, 2014 | Research library
The objective of this study was manifold: first, to examine security behaviors in real-life scenarios by scrutinizing elements that might compel an individual to comply with a request made by an attacker; second, to assess whether including victim-specific information...
Sep 24, 2014 | Research library
You are a problem. You are a risk to your employer. The actions you take and the activities you perform at work, online, and even in your personal life put your employer at risk. You need to know how you are a security risk to the organization and what you can do to...
Sep 10, 2014 | Research library
A large number of information security breaches at the workplace result from employees’ failure to comply with organizational information security guidelines. Recent surveys report that 78% of computer attacks appear in the form of viruses embedded in email...
Sep 8, 2014 | Research library
Researchers studied people’s resistance to persuasion, testing traditional explicit warnings against implicit priming warnings. They found simply reminding people of a situation in which someone attempted to influence them (ie, implicit priming) was as effective...
Sep 5, 2014 | Book, Research library
83 theories of behaviour change that could be used to design behaviour change interventions are discussed in detail.
Sep 3, 2014 | Research library
The modern era sees highly secure operating systems and software, resulting in cyber attackers focusing their efforts on exploiting human vulnerabilities to breach an organization’s information systems. Given the growing number of cyber attacks aimed at...