May 1, 2012 | Research library
This paper focuses on the issue of employees’ non-compliance with Information System (IS) security procedures, a major concern for organizations. Previous studies have not considered the impact of past and automatic behavior on employees’ compliance...
Mar 31, 2012 | Research library
User education must focus on challenging and correcting the misconceptions that guide current user behavior. To date, user education on phishing has tried to persuade them to check URLs and a number of other indicators, with limited success. The authors evaluate a...
Mar 10, 2012 | Research library
A report on the findings of an ambitious project aiming to understand the behaviours involved in online grooming across Europe. The report concludes groomers’ behaviours vary wildly and that, by facilitating anonymity, technology helps groomers justify their...
Mar 9, 2012 | Journal article, Research library
A thorough paper reporting the findings of Shari Pfleeeger and Deanna Caputo’s research into blending behavioural science and cyber security. Following an introduction into the relationship between human behaviour and cyber security, the paper discusses proven...
Mar 9, 2012 | Research library
The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. This study was a...
Mar 1, 2012 | Research library
This study will explore variances in password strength across demographics such as age, gender, ethnicity, and education level; organizational password rules; and security training. It also determines the degree to which the individual perception of security threats...