Jul 20, 2011 | Research library
In this study, we employed an iterative process to design firewall warnings. We developed a visualized interface for a personal firewall, drawing from a physical security metaphor. We carried out a study to assess how comprehensible our proposed warnings are to users,...
Jul 5, 2011 | Research library
All organisations must take active steps to maintain the security and integrity of their information resources, and nowhere is this strategy more critical than in hospitals where issues of information accuracy and patient confidentiality are paramount. Of all the...
Jun 1, 2011 | Research library
Hacking into corporate IT systems and individuals’ computers is no longer a sport for bragging rights, but a major organized economic activity aiming for significant profits controlled largely by underground networks of criminals and organized crime on a global...
Jun 1, 2011 | Research library
This research presents a comprehensive model to understand phishing susceptibility, building on previous studies on information processing and interpersonal deception. The model, validated using a group targeted by a real phishing attempt, explains nearly 50% of the...
May 31, 2011 | Research library
This paper contributes to the growing body of literature on privacy and security by looking at self-reported password sharing practices. 62 men and 60 women recruited through a combination of snowball sampling and small ads answered a series of open-ended questions...
May 31, 2011 | Research library
Employee non-compliance with information systems (IS) security procedures is a key concern for organizations. However, even though the importance of having effective IS security training is widely acknowledged by scholars and practitioners, the existing literature...