Sep 3, 2011 | Research library
The authors present experimental and simulation results of an outcome-based learning model for the identification of threats to security systems. This model integrates judgment, decision-making, and learning theories to provide a unified framework for the behavioral...
Sep 1, 2011 | Research library
This study addresses cyberslacking, defined as the use of internet and mobile technology for personal purposes during work hours. It’s a growing concern for organizations due to potential lost revenue. The study, using a nationally representative sample of...
Aug 31, 2011 | Research library
Employees’ non-compliance with IS security procedures is a key concern for organizations. To tackle this problem, there exist several training approaches aimed at changing employees’ behavior. However, the extant literat ure does not examine the elementary...
Aug 15, 2011 | Research library
Social networking sites are a popular medium of interaction and communication. Social networking sites provide the ability to run applications and games to test users’ knowledge. The popularity of social networks makes it an ideal tool through which awareness...
Aug 13, 2011 | Research library
This report presents the findings of a study which investigated the outcome of password strength and the behaviour; and sentiment of users subjected to four different password-composition policies.
Aug 10, 2011 | Research library
The research in this paper provides evidence for the “bystander effect”, an effect in which bystanders fail to help individuals due to the presence of other bystanders. The concept is born from various psychological factors, including diffusion of responsibility and...