Jan 3, 2014 | Research library
This paper delves into the process of how individuals acquire, assess, and process data, specifically examining the psychology of risk perception to pinpoint essential factors for crafting effective messages. The application of the mental models methodology in risk...
Jan 1, 2014 | Research library
Online security advice aims to persuade users to behave securely, but appears to have limited effects at changing behaviour. We propose security advice targeted at end-users should employ visual rhetoric to form an effective, memorable, and persuasive method of...
Jan 1, 2014 | Research library
One of the largest preventable sources of computer compromise is old software that has not been updated with the latest security-related updates. Security updates correct known vulnerabilities in software and protect the computer from future attacks. However, users do...
Jan 1, 2014 | Research library
In this chapter, the author investigates the relationships between unethical behaviors from the viewpoint of information security and organizational commitment by analyzing micro data collected from a survey the author conducted in March 2012. As a result, at first,...
Jan 1, 2014 | Research library
Given the diffusion of the Social Web and increased disclosure of personal information online, the ‘privacy paradox’ suggests that while Internet users are concerned about privacy, their behaviors do not mirror those concerns. This study investigates the potential...
Jan 1, 2014 | Research library
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a...