Jul 23, 2013 | Research library
While the issue of under-reporting accidents is becoming more acknowledged in literature, there is less understanding regarding the work environment factors that predict the severity of such under-reporting. This paper analyses data from 786 employees across 24 US...
Jul 15, 2013 | Research library
Users are able to remember their phone numbers and postal codes, their student numbers, PIN numbers, and social insurance numbers. Why, then, do users have trouble remembering their passwords? This paper considers the hypothesis that being able to access written notes...
Jul 3, 2013 | Research library
While personal data is a source of competitive advantage, businesses should consider the potential reaction of individuals to certain types of data requests. Privacy research has identified some factors that impact privacy perceptions, but these have not yet been...
Jul 2, 2013 | Research library
Information security has adapted to the modern collaborative organisational nature, and abandoned “command-and-control” approaches of the past. But when it comes to managing employee’s information security behaviour, many organisations still use policies proscribing...
Jul 1, 2013 | Research library
One strategy for improving cyber security would be for Internet service providers (ISPs) to take a more active role in curtailing criminal behavior over the Internet. However, few ISPs today are offering robust security to their customers, arguing that home Internet...
Jul 1, 2013 | Research library
The behaviour of employees influences information security in virtually all organisations. To inform the employees regarding what constitutes desirable behaviour, an information security policy can be formulated and communicated. However, not all employees comply with...