Jan 1, 2013 | Research library
Cybersecurity is a national priority in this big data era. Because of negative externalities and the resulting lack of economic incentives, companies often underinvest in security controls, despite government and industry recommendations. Although many existing...
Dec 5, 2012 | Research library
The present article reports a survey conducted to identify the practices on passwords usage, focusing particularly on memory limitations and the use of passwords across individuals with different age and education backgrounds. A total of 263 participants were...
Nov 23, 2012 | Research library
Phishing, a pervasive form of social engineering crime on the web, presents significant challenges due to its escalating occurrences and evolving techniques. This study reviews existing phishing literature and countermeasures to assess the progress and advancement of...
Oct 31, 2012 | Journal article, Research library
Computer self-efficacy (CSE) has been a popular and important construct in information systems research for more than two decades. Although CSE researchers have conducted extensive qualitative reviews, quantitative analyses are lacking for studies of the relationships...
Oct 15, 2012 | Journal article, Research library
We proposed and empirically tested a mediating model for examining the effects of multilevel sanctions on preventing information security violations in the workplace. The results of the experiment suggested that personal self-sanctions and workgroup sanctions have...
Oct 2, 2012 | Research library
Botnets have become a vital part of underground economy and botherders are actively looking for new recruits to join their bot army. A lapse by an end user or an administrator in terms of not updating their software enables the botherder to achieve this objective. In...