Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Awareness, behaviour and culture: The ABC in cultivating security compliance
A substantial proportion of security breaches stem from human factors, necessitating their consideration alongside technical elements. Scholars propose that a security culture fosters suitable employee behaviors leading to compliance. Consequently, organizations...
Will the “Phisher-Men” reel you in?: Assessing individual differences in a phishing detection task
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how...
Smart insiders: Exploring the threat from insiders using the Internet-of-Things
The Internet-of-Things (IoT) is set to be one of the most disruptive technology paradigms since the advent of the Internet itself. Market research company Gartner estimates that around 4.9 billion connected things will be in use in 2015, and around 25 billion by 2020....
Cybersecurity’s human factor: Lessons from the Pentagon
The article shares the US Defense Department’s approach to addressing the human side of cyber security, allowing business leaders to apply the same framework to their own organisations.
Information security conscious care behaviour formation in organizations
Technological solutions alone can't assure information security. User behavior plays a pivotal role in this field. Given its vast expanse, the Internet offers numerous possibilities for security infringements. Attackers utilize various methods to alter the...
Anonymity, privacy, and security online
This survey by the Pew Research Center’s Internet Project asked 1,002 adults about their Internet habits. It is laid out in five parts: the quest for anonymity online; concerns about personal information online; who internet users are trying to avoid, the information...
The online dating romance scam: The psychological impact on victims – both financial and non-financial
This paper finds for most people, the loss of a relationship following the culmination of an online dating scam is more unsettling than any financial losses suffered. According to the paper, few victims of online dating scams find a sufficient way to cope following...
On cyber security, technology and human behaviors
According to this post, it’s important to take an innovative approach when it comes to cyber security as conventional means (such as posters or one-time awareness training) do not change behavior. Further, the post suggests risk-mitigating behaviors must become...
Implicit measures and online risks
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and...
Risk, risk perception, risk management – A review of the literature
This paper aims to summarize the findings of risk research across various fields and examine their impact on risk management practices. The fundamental approaches to risk discussed in this paper suggest that the concepts of probability used in studying processes in...
Social influence or personal preference? Examining the determinants of usage intention across social media with different sociability
This study investigates the roles of social influence and personal preference in users' social media adoption behavior, proposing sociability as a criterion to classify social media. The study examines the determinants of usage intention across social media with...
Identifying how firms manage cyber security investment
A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not...
HP security research – Cyber risk report 2015
An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...
Cyber security: A failure of imagination by CEOs
This paper discusses the involvement of CEOs in cyber security. Backed up by strong research, it explores the current state of CEO involvement, addresses some of the challenges involved in CEO involvement and offers four golden rules of cyber security.
Two-factor authentication: Is the world ready? Quantifying 2FA adoption
This paper is the outcome of a study which explores the state of two-factor authentication (2FA), specifically focussing on the largest existing 2FA service, offered by Google.
A systematic review of approaches to assessing cybersecurity awareness
The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is...
“ My data just goes everywhere : ” User mental models of the internet and implications for privacy and security
Many people use the Internet every day yet know little about how it really works. Prior literature diverges on how people’s Internet knowledge affects their privacy and security decisions. We undertook a qualitative study to understand what people do and do not know...
Studying safe online banking behaviour : A protection motivation theory approach
In this paper, a conceptual research model is proposed to study safe online banking behaviour. The Protection Motivation Theory functions as the core of the model. The model is extended with additional variables, making it suitable for the online banking context. The...
Too much knowledge? Security beliefs and protective behaviors among United States internet users
This study explores the mental models of information security threats held by users who make security decisions about their home computers. A survey of a large representative sample of US Internet users revealed demographic differences in both beliefs about security...
Nudging towards security: Developing an application for wireless network selection for android phones
People make security choices on a daily basis without fully considering the security implications of those choices. In this paper we present a prototype application which promotes the choice of secure wireless network options, specifically when users are unfamiliar...
Evolvement of information security research on employees behavior: A systematic review and future direction
Information Security (IS) is one of the biggest concerns for many organizations. This concern has led many to focus a huge effort into studying different IS areas. One of these critical areas is the human aspect, where investigation of employees' behaviors has emerged...