Jul 27, 2012 | Research library
Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of security services have been developed, including an email authentication service designed to cope with email threats. It remains unknown how...
Jul 20, 2012 | Research library
Researchers test how power and self-focus moderate the effectiveness of social influence in decision-making. They find those with more power and self-focus to be less affected by social influence when making ethical decisions.
Jul 11, 2012 | Research library
Non-expert computer users frequently face security-related decisions, and while their choices are often not optimal, they are not random. This raises the question: what informs these decisions? Our research posits that these decisions are largely influenced by stories...
Jul 10, 2012 | Research library
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitive information such as usernames and passwords from its victims. To facilitate cyberspace as a secure environment, phishing education needs to be made accessible to home...
Jul 4, 2012 | Research library
Phishing is an increasingly more prevalent form of online, social engineered scams that escalate costs and risks to society year to year. This study demonstrates an association between anti-phishing training techniques used in previous research and individual...
Jul 3, 2012 | Research library
Protecting children from the risks posed by negative influences in the online environment (that is, cyber-safety) is a growing concern within the Australian community. In this study, the views of 151 individuals and community stakeholder organizations, which represent...