Dec 1, 1999 | Journal article, Research library
In the late 90’s, it was largely considered users were unmotivated and lazy when it came to cyber security. This UCL research suggested, actually, users compromised security systems through lack of security knowledge and non-user centric security mechanisms....
Jan 9, 1982 | Journal article, Research library
This paper discusses four studies that allowed the authors to develop and validate a scale measuring an individual’s ‘need for cognition’ (that is, an indivdual’s tendency to engage in thinking and enjoy the practice of thinking things through). Notably,...
Jan 9, 1974 | Journal article, Research library
People are often faced with making judgements base on what they believe will happen. This paper proposes said beliefs are largely born from heuristics, including representativeness, availability and anchoring.
Jan 9, 1968 | Journal article, Research library
According to this paper, the only way to motivate the employee is to give him or her challenging work and the responsibility for its completion. As carrot and stick methods – such as financial incentives or disciplinaries – are examples of neither, they should be...