Dec 14, 2013 | Research library
Use of the Internet has become our second nature. With each passing day computers and mobile devices are becoming ubiquitous in our society. In this backdrop the confidentiality of information is now a question of paramount importance. It is understood fact now that...
Dec 5, 2013 | Research library
Researchers offer participants persuasive communications in the form of charitable appeals and commercial advertisements. By drawing the attention of the participant to how similar they are with either a victim of misfortune (in a charitable appeal) or a protagonist...
Dec 1, 2013 | Research library
The 2014 Security Threat Report discusses the evolution of the cyber threat landscape. It suggests that less skilled cybercriminals are being pushed out of the market, leading to a survival of the fittest scenario. This evolution is expected to result in fewer, but...
Dec 1, 2013 | Research library
Employees’ failures to follow information security policy can be costly to organizations, causing organizations to implement security controls to motivate secure behavior. Information security research has explored many control-related motivations (e.g.,...
Dec 1, 2013 | Research library
The ongoing debate about online privacy attests to the concerns of web users. These privacy anxieties encourage consumers to adopt data protection features, shape their valuation of existing features, and can guide their preferences among competing businesses....
Oct 10, 2013 | Newsletter journal, Research library
The O’Neill Exemplifies Safety Leadership subsection of this NSMS Digest focuses on former secretary of the U.S. Treasury Paul O’Neill’s advocation of transparency in safety measures. O’Neill argues for real-time information on who may have had...