Jan 11, 2012 | Research library
Following a literature review, the paper’s authors built a measure of perceived deception in advertising. The measure was fuelled by perceived veracity and perceived ethic, and may allow marketing practioners to evaluate the percieved deception of marketing...
Jan 10, 2012 | Research library
Many organizations struggle with ineffective and/or inefficient access control, but these problems and their consequences often remain invisible to security decision-makers. Prior research has focused on improving the policy-authoring part of authorization and does...
Jan 10, 2012 | Research library
To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information...
Jan 9, 2012 | Book, Research library
In this book, Charles Duhigg draws on psychological and neurological research to introduce the concept of habit loops. According to the book, habits are formed when a cue that leads to a behaviour leads to a reward. Changing habits requires amending habit loops....
Jan 9, 2012 | Journal article, Research library
In this study, 120 participants were asked to test an (arbitrary) online tool. During testing, participants encountered a PDF download warning. All participants noticed the warning, but 81.7% downloaded the PDF file that triggered it regardless. The authors’ attribute...
Jan 4, 2012 | Research library
Information security policy compliance is one of the key concerns that face organizations today. Although, technical and procedural security measures help improve information security, there is an increased need to accommodate human, social and organizational factors....