Jan 9, 2010 | Journal article, Research library
In this study, participants performed a computer memory task while compliance to three safety measures was monitored. Compling with indirect warnings – that is, warnings triggered by entities other than researchers – was not significantly different to compliance with...
Dec 26, 2009 | Journal article, Research library
End users are frequently criticised as the sources of bad security practice, and it is suggested they might take the issue more seriously if they experienced a breach. An option for enabling this would be for security administrators to deliberately create conditions...
Nov 15, 2009 | Journal article, Research library
The purpose of this paper is to measure and discuss the effects of an e-learning tool aiming at improving the information security knowledge, awareness, and behaviour of employees. Design/methodology/approach – The intervention study has a pre- and post-assessment of...
Feb 26, 2009 | Journal article, Research library
This article examines the levels of security acceptance that can exist amongst employees within an organisation, and how these levels relate to three recognised levels of corporate culture. It then proceeds to identify several factors that could be relevant to the...
Jan 9, 2009 | Journal article, Research library
Principal Microsoft Researcher Cormac Herley argues users’ rejection of security procedures is often entirely rational as the expected benefits of following security advice are often outweighed by the expected costs.
Dec 9, 2008 | Journal article, Research library
The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti-spyware tools when they are faced with security threats.