Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Phishing for phishing awareness
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn...
Analyzing facebook privacy settings: User expectations vs. reality
The sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the mainstream media. Our...
Johnny in internet café: User study and exploration of password autocomplete in web browsers
One of the most popular aids adopted by users to reduce the pain suffered from the use of passwords is browsers' autocomplete feature. This feature, caching username and password after getting the user consent and using them later for automatic completion, is...
Social networking websites and posting personal information: An evaluation of protection motivation theory
The popularity of social networking websites among Internet users continues to grow, even though social networking remains a risk for users who do not participate with caution. Using protection motivation theory (PMT) as a theoretical lens to provide a research model,...
Guidelines for usable cybersecurity: Past and present
Usability is arguably one of the most significant social topics and issues within the field of cybersecurity today. Supported by the need for confidentiality, integrity, availability and other concerns, security features have become standard components of the digital...
Influencing mental models of security: a research agenda
This paper discusses the challenges faced by home computer users in the United States, most of whom have little computer security knowledge or training. Despite this, they regularly make security-related decisions, often unknowingly, guided by their "mental models" of...
Trustworthy and effective communication of cybersecurity risks: A review
Slowly but surely, academia and industry are fully accepting the importance of the human element as it pertains to achieving security and trust. Undoubtedly, one of the main motivations for this is the increase in attacks (e.g., social engineering and phishing) which...
Modeling behavioral considerations related to information security
The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral...
Personal internet use at work: Understanding cyberslacking
This study addresses cyberslacking, defined as the use of internet and mobile technology for personal purposes during work hours. It's a growing concern for organizations due to potential lost revenue. The study, using a nationally representative sample of American...
Toward a new meta-theory for designing information systems (IS) security training approaches
Employees’ non-compliance with IS security procedures is a key concern for organizations. To tackle this problem, there exist several training approaches aimed at changing employees’ behavior. However, the extant literat ure does not examine the elementary...
Design of cyber security awareness game utilizing a social media framework
Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users' knowledge. The popularity of social networks makes it an ideal tool through which awareness can be...
Of passwords and people: Measuring the effect of password-composition policies
This report presents the findings of a study which investigated the outcome of password strength and the behaviour; and sentiment of users subjected to four different password-composition policies.
Bystander intervention in emergencies: Diffusion of responsibility
The research in this paper provides evidence for the “bystander effect”, an effect in which bystanders fail to help individuals due to the presence of other bystanders. The concept is born from various psychological factors, including diffusion of responsibility and...
A brick wall, a locked door, and a bandit: A physical security metaphor for firewall warnings
In this study, we employed an iterative process to design firewall warnings. We developed a visualized interface for a personal firewall, drawing from a physical security metaphor. We carried out a study to assess how comprehensible our proposed warnings are to users,...
Information security policies in the UK healthcare sector: a critical evaluation
All organisations must take active steps to maintain the security and integrity of their information resources, and nowhere is this strategy more critical than in hospitals where issues of information accuracy and patient confidentiality are paramount. Of all the...
Does deterrence work in reducing information security policy abuse by employees?
Hacking into corporate IT systems and individuals' computers is no longer a sport for bragging rights, but a major organized economic activity aiming for significant profits controlled largely by underground networks of criminals and organized crime on a global scale....
Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model
This research presents a comprehensive model to understand phishing susceptibility, building on previous studies on information processing and interpersonal deception. The model, validated using a group targeted by a real phishing attempt, explains nearly 50% of the...
Self-reported password sharing strategies
This paper contributes to the growing body of literature on privacy and security by looking at self-reported password sharing practices. 62 men and 60 women recruited through a combination of snowball sampling and small ads answered a series of open-ended questions...
Improving employees’ information systems (IS) security behavior : Toward a meta-theory of IS security training and a new framework for understanding employees’ IS security behavior
Employee non-compliance with information systems (IS) security procedures is a key concern for organizations. However, even though the importance of having effective IS security training is widely acknowledged by scholars and practitioners, the existing literature...
Protection motivation theory: A phishing expedition
As the number of individuals with email accounts continues to increase, so does the risk of unintentionally giving out sensitive information. Phishing has been described as a type of social engineering with the goal of gaining confidential or sensitive information...
When does 360-degree feedback create behavior change? And how would we know it when it does?
The potential of 360-degree feedback in fostering behavioral and organizational change is well-recognized, but research on its effectiveness yields mixed results due to diverse design features. Four crucial characteristics for successful organizational change through...