Jul 3, 2012 | Research library
Among information security controls, the literature gives a central role to information security policies. However, there is a reduced number of empirical studies about the features and components of information security policies. This research aims to contribute to...
Jun 5, 2012 | Research library
This paper suggests future research to delve into the motivations of individuals who breach organizational security, aiming to understand the connection between security intentions and behavior.
May 31, 2012 | Research library
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly...
May 15, 2012 | Conference proceedings, Research library
Voting technologies have undergone intense scrutiny in recent years. In contrast, the human components of these socio-technical systems, including the policies and procedures that guide and bind behavior have received less attention. To begin to understand pollworker...
May 3, 2012 | Research library
Organizations typically respond to information breaches by implementing policies to regulate and control employee actions, particularly around the usage of information technology. However, there’s limited evidence indicating these policies effectively curb...
May 1, 2012 | Research library
Identity theft and related fraudulent activities affect approximately one in twenty-five adults each year across western societies. The Internet provides a new avenue for obtaining identity tokens and identifying information and increases the scale on which identity...