Jan 4, 2012 | Conference proceedings, Research library
In this paper we leverage a canonical nine dimensional model of offline risk perception to better understand online risk perceptions. Understanding risk perception facilitates the development of better risk communication and mitigation technologies. We conducted a...
Jan 1, 2012 | Research library
Insiders represent a major threat to the security of an organization’s information resources (Warkentin & Willison, 2009; Stanton et al., 2005). Previous research has explored the role of protection motivation or of deterrence in promoting compliant behavior, but...
Jan 1, 2012 | Research library
This article discusses phishing attacks. It introduces the anatomy of a phishing attack, considers why people fall for phishing attacks and estimates the damage of phishing attacks. The article also discusses common tecniques for preventing phishing....
Dec 6, 2011 | Research library
Information breaches demand a vigorous response from organizations. The traditional response is to institute policies to constrain and control employee behavior. Information security policies inform employees about appropriate uses of information technology in an...
Nov 9, 2011 | Journal article, Research library
In this study, health care professionals washed their hands to a significantly greater degree when they were reminded of the implications for patients as opposed to the implications for themselves. The study suggests personal wellbeing is not always the greatest...
Nov 9, 2011 | Research library
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn...