Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Social psychological factors in lifestyle change and their relevance to policy
This article examines the social psychological theories and research that can be used to design better behaviour interventions. Although the paper focuses on health, the review could be applied in a wide variety of contexts – cyber security included.
Impeding ecological sustainability through selective moral disengagement
This paper discusses moral disengagement, with an emphasis on how moral disengagement impedes ecological sustainability. The author notes moral disengagement comes about through: exonerative comparisons that render detrimental practices as righteous; the use of...
Which factors explain employees’ adherence to information security policies? An empirical study
It is widely agreed that a key threat to information security is caused by careless employees who do not adhere to the information security policies of their organizations. In order to ensure that employees comply with the organization’s information security...
Deceit and deception: A large user study of phishing
This study is a large scale investigation of trust manipulation tactics used by phishing web sites and email messages. The experiment focuses on media authenticity evaluations, rather than content credibility with the assumption that its authors are known. It tests...
Investigating the concept of information security culture
The concept of an 'information security culture' is relatively new. A review of published research on the topic suggests that it is not the information security panacea that has been suggested. Instead it tends to refer to a range of existing techniques for addressing...
Factors influencing protection motivation and IS security policy compliance
The key threat to IS security is constituted by careless employees who do not comply with IS security policies. To ensure that employees comply with organizations' IS security procedures, a number of IS security policy compliance means have been proposed in the past....
Cultivating an organizational information security culture
This paper emphasizes that an information security solution is a crucial element for any organization. One of the main challenges in integrating information security into an organization is the actions and behaviors of employees. For information security to become...
Decision strategies and susceptibility to phishing
This study reports on what everday user do when they come across suspicious emails. An analysis suggests people can manage risks they're familiar with but are unable to extrapolate their strategies to deal with unfamiliar risks.
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability;...
Imagined communities: Awareness, information sharing, and privacy on the facebook
Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study...
Practicing safe computing: Message framing, self-view, and home computer user security behavior intentions
With its global reach and pervasiveness, the Internet enables individuals to be more connected through electronic linkages than ever before. In such a highly inter-dependent network, individual behaviors can have far-reaching consequences that transcend borders...
Implementation Intentions and Goal Achievement: A Meta‐analysis of Effects and Processes
Holding a strong goal intention (“I intend to reach Z!”) does not guarantee goal achievement, because people may fail to deal effectively with self‐regulatory problems during goal striving. This review analyzes whether realization of goal intentions is facilitated by...
Accuracy of deception judgments
The authors review literature on deception studies and conclude people can correctly identify a lie (or a truth) 54% of the time. Authors also conclude that people are more accurate in judging audible than visible lies, that people appear deceptive when motivated to...
Culture and nonverbal behaviour
Culture is defined as a product of biological needs and functions, social problems, and contexts. The role of culture in nonverbal communication (such as facial expressions) is considered, with the author concluding culture does indeed play a small role in the...
The persuasive influence of emotion in cancer prevention and detection messages
This paper reviews literature on the relationship between emotion and persuasion, with a focus on how the relationship might be harnessed to persuade people to both check for and take actions to prevent cancer. It suggests messages should select a particular emotion...
Why phishing works
Researchers exploring why phishing continues to fool people asked 22 people to categorise 20 websites as either fraudulent or legitimate. They found 23% of participants did not look at browser-based security cues, leading to incorrect choices 40% of the time. They...
A framework for understanding trust factors in web-based health advice
Researchers present a framework for understanding what it is that makes people either accept or reject health advice offered online. An experiment suggests credibility of information and personalisation of content predict acceptance of advice, whereas design appeal...
Identity fraud: What about the victim?
This study assesses the impact of identity fraud on victims, finding: victims' identities were most likely to have been used to apply for a store card, credit card and/or mobile phone account; that 14 per cent of victims lost money from personal accounts or credit...
Assessing end-user awareness of social engineering and phishing
This experiment revolved around a web-based survey, which presented a mix of 20 legitimate and illegitimate emails to participants. Researchers asked participants to classify emails as either legitimate or illegitimate and explain their rationale. The 179 participants...
Risk communication, risk perception and information security
This paper puts forward the view that an individuals perception of the risks associated with information systems determines the likelihood and extent to which she or he will engage in risk taking behaviour when using a computer. It is suggested that this behavior can...
Don’t be a phish : Steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced in the last year an increase in frequency and diversity. While regular phishing attacks...