Jan 10, 2014 | Research library
This paper reports on the researchers’ efforts to collect and analyse data from unintentional insider threats, noting how difficult data collection and analysis is in this area. Researchers note overcoming data collection and analysis issues is and will be...
Jan 10, 2014 | Research library
Organizations have long relied upon the threat of sanctions to influence employees to follow information security policies. Unfortunately, the belief in the power of deterrence has provided mixed results in both research and in real life. This study explored the...
Jan 9, 2014 | Report, Research library
Behavioural change theory suggests influencers of behavioural change include environmental factors (such as technological design), social influencers (such as peers or family) and personal influencers (such as what we know and believe). Using the MINDSPACE framework...
Jan 9, 2014 | Research library
Information security culture guides how things are done in organization in regard to information security, with the aim of protecting the information assets and influencing employees’ security behavior. In this paper, we review key literature on information security...
Jan 6, 2014 | Research library
Passwords have long been the preferred method of user authentication, yet poor password practices cause security issues. The study described in this paper investigates how user perceptions of passwords and security threats affect intended compliance with guidelines...
Jan 5, 2014 | Journal article, Research library
Software engineering researcher Shari Lawrence Pfleeger and her co-authors review the latest psychological research on moral values and habit formation, discussing how principles and theories can be leverages to encourage people to behave in a cyber secure manner....