Jan 11, 2013 | Research library
The purpose of this research is to analyze information security awareness (ISA) programs and the measurement of ISA behavior in banking organizations. The underlying paper summarizes the qualitative and exploratory part of our two-staged mixed methods research on the...
Jan 10, 2013 | Research library
According to this study: adolescents appear to be the age group most vulnerable to online grooming; parental involvement in a child’s internet use protects against online grooming; and the more risk-taking behaviors a young person carries out, the more...
Jan 10, 2013 | Research library
Researchers analyse 200 scam emails in search of patterns, and find alert and account verification, urgency, potential monetary gain, business proposals and mentions of large, unclaimed funds are repeatedly used in scam emails.
Jan 10, 2013 | Research library
This study examines the correlation between the Big Five personality traits (extraversion, agreeableness, openness, conscientiousness, and neuroticism) and email phishing response. It finds neuroticism to be most correlated with email phishing susceptibilty....
Jan 7, 2013 | Research library
Passwords remain the dominant authentication mechanism for information security. Unfortunately, research has shown that most passwords are highly insecure. Given the risks of using weak passwords, there is a need to effectively motivate users to select strong...
Jan 2, 2013 | Research library
Today’s organizations are highly dependent on information management and processes. Information security is one of the top issues for researchers and practitioners. In literature, there is consent that employees are the weakest link in IS security. A variety of...