Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Security policy compliance: User acceptance perspective
Information security policy compliance is one of the key concerns that face organizations today. Although, technical and procedural security measures help improve information security, there is an increased need to accommodate human, social and organizational factors....
End user perception of online risk under uncertainty
In this paper we leverage a canonical nine dimensional model of offline risk perception to better understand online risk perceptions. Understanding risk perception facilitates the development of better risk communication and mitigation technologies. We conducted a...
The role of individual characteristics on insider abuse intentions
Insiders represent a major threat to the security of an organization’s information resources (Warkentin & Willison, 2009; Stanton et al., 2005). Previous research has explored the role of protection motivation or of deterrence in promoting compliant behavior, but...
The current state of phishing attacks
This article discusses phishing attacks. It introduces the anatomy of a phishing attack, considers why people fall for phishing attacks and estimates the damage of phishing attacks. The article also discusses common tecniques for preventing phishing.
Blaming noncompliance is too convenient: What really causes information breaches?
Information breaches demand a vigorous response from organizations. The traditional response is to institute policies to constrain and control employee behavior. Information security policies inform employees about appropriate uses of information technology in an...
It’s not all about me: Motivating hand hygiene among health care professionals by focusing on patients
In this study, health care professionals washed their hands to a significantly greater degree when they were reminded of the implications for patients as opposed to the implications for themselves. The study suggests personal wellbeing is not always the greatest...
Phishing for phishing awareness
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn...
Analyzing facebook privacy settings: User expectations vs. reality
The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our...
Johnny in internet café: User study and exploration of password autocomplete in web browsers
One of the most popular aids adopted by users to reduce the pain suffered from the use of passwords is browsers' autocomplete feature. This feature, caching username and password after getting the user consent and using them later for automatic completion, is...
Social networking websites and posting personal information: An evaluation of protection motivation theory
The popularity of social networking websites among Internet users continues to grow, even though social networking remains a risk for users who do not participate with caution. Using protection motivation theory (PMT) as a theoretical lens to provide a research model,...
Guidelines for usable cybersecurity: Past and present
Usability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by the need for confidentiality, integrity, availability and other concerns, security features have become standard components of the digital...
Influencing mental models of security: a research agenda
This paper discusses the challenges faced by home computer users in the United States, most of whom have little computer security knowledge or training. Despite this, they regularly make security-related decisions, often unknowingly, guided by their "mental models" of...
Trustworthy and effective communication of cybersecurity risks: A review
Slowly but surely, academia and industry are fully accepting the importance of the human element as it pertains to achieving security and trust. Undoubtedly, one of the main motivations for this is the increase in attacks (e.g., social engineering and phishing) which...
Modeling behavioral considerations related to information security
The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral...
Personal internet use at work: Understanding cyberslacking
This study addresses cyberslacking, defined as the use of internet and mobile technology for personal purposes during work hours. It's a growing concern for organizations due to potential lost revenue. The study, using a nationally representative sample of American...
Toward a new meta-theory for designing information systems (IS) security training approaches
Employees’ non-compliance with IS security procedures is a key concern for organizations. To tackle this problem, there exist several training approaches aimed at changing employees’ behavior. However, the extant literat ure does not examine the elementary...
Design of cyber security awareness game utilizing a social media framework
Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users' knowledge. The popularity of social networks makes it an ideal tool through which awareness can be...
Of passwords and people: Measuring the effect of password-composition policies
This report presents the findings of a study which investigated the outcome of password strength and the behaviour; and sentiment of users subjected to four different password-composition policies.
Bystander intervention in emergencies: Diffusion of responsibility
The research in this paper provides evidence for the “bystander effect”, an effect in which bystanders fail to help individuals due to the presence of other bystanders. The concept is born from various psychological factors, including diffusion of responsibility and...
A brick wall, a locked door, and a bandit: A physical security metaphor for firewall warnings
In this study, we employed an iterative process to design firewall warnings. We developed a visualized interface for a personal firewall, drawing from a physical security metaphor. We carried out a study to assess how comprehensible our proposed warnings are to users,...
Information security policies in the UK healthcare sector: a critical evaluation
All organisations must take active steps to maintain the security and integrity of their information resources, and nowhere is this strategy more critical than in hospitals where issues of information accuracy and patient confidentiality are paramount. Of all the...