May 1, 2013 | Research library
This paper addresses the issue of cyberloafing, a widespread problem for many organizations. Some researchers propose a deterrence approach, using acceptable use policies for internet-based applications along with mechanisms to monitor employee internet usage and...
Apr 27, 2013 | Research library
We performed a laboratory experiment to study the privacy tradeoff offered by Facebook Connect: disclosing Facebook profile data to third-party websites for the convenience of logging in without creating separate accounts. We controlled for trustworthiness and amount...
Apr 3, 2013 | Research library
Password reuse – using the same password for multiple accounts – is a prevalent phenomenon that can make even the most secure systems vulnerable. When passwords are reused across multiple systems, hackers may compromise accounts by stealing passwords from low-security...
Apr 1, 2013 | Research library
The matrix barcodes known as Quick Response (QR) codes are rapidly becoming pervasive in urban environments around the world. QR codes are used to represent data, such as a web address, in a compact form that can be scanned readily and parsed by consumer mobile...
Apr 1, 2013 | Research library
This article critically examines the insider threat in organizations in the context of electronic information exchanges. The current data loss threat model primarily focuses on the criminal outsider, often viewing the insider threat as ‘outsiders by...
Mar 3, 2013 | Research library
Social engineering is the biggest security threat to financial institutions because it exploits the weakest link in any security system: the human element. It is proposed here that combining specialized training on social engineering followed by repeated audit tests...