Feb 1, 2013 | Research library
Smartphone users visit application marketplaces (or app stores) to search and install applications. However, these app stores are not free from privacy-invasive apps, which collect personal information without sufficient disclosure or people’s consent. To nudge people...
Jan 28, 2013 | Research library
A widely promoted preventative measure against becoming a victim of cybercrime is the control of personal information online; however, little is known about what predicts the use of this type of protective safety behaviour. This study examines the utility of the...
Jan 25, 2013 | Research library
With an increasing number of organizations allowing personal smart phones onto their networks, considerable security risk is introduced. The security risk is exacerbated by the tremendous heterogeneity of the personal mobile devices and their respective installed pool...
Jan 15, 2013 | Conference proceedings, Research library
While organizations are making a considerable effort to leverage formal and informal control mechanisms (e.g., policies, procedures, organizational culture) to improve security, their impact and effectiveness is under scrutiny as employees seldom comply with...
Jan 11, 2013 | Research library
The purpose of this research is to analyze information security awareness (ISA) programs and the measurement of ISA behavior in banking organizations. The underlying paper summarizes the qualitative and exploratory part of our two-staged mixed methods research on the...
Jan 10, 2013 | Research library
According to this study: adolescents appear to be the age group most vulnerable to online grooming; parental involvement in a child’s internet use protects against online grooming; and the more risk-taking behaviors a young person carries out, the more...