May 29, 2011 | Research library
As the number of individuals with email accounts continues to increase, so does the risk of unintentionally giving out sensitive information. Phishing has been described as a type of social engineering with the goal of gaining confidential or sensitive information...
May 27, 2011 | Journal article, Research library
The potential of 360-degree feedback in fostering behavioral and organizational change is well-recognized, but research on its effectiveness yields mixed results due to diverse design features. Four crucial characteristics for successful organizational change through...
May 20, 2011 | Research library
While past work has examined password usage on a specific computer, web site, or organization, there is little work examining overall password usage in daily life. Through a diary study, we examine all usage of passwords, and offer some new findings based on...
May 15, 2011 | Journal article, Research library
Security policies are required that protect information from unauthorised access, and also respect challenges users face in creating, and particularly managing, increasing numbers of passwords. This paper investigates real password use in the context of daily life. It...
May 7, 2011 | Research library
This paper reports findings from a multi-method set of four studies that investigate why we continue to fall for phish. Current security advice suggests poor spelling and grammar in emails can be signs of phish. But a content analysis of a phishing archive indicates...
May 4, 2011 | Research library
What is it that makes people fall for email scams? This analysis concluded that scammers are most concerned about building solidarity with their victims and playing to a mark’s egocentrism, which both ultimately prevent victims from making well-informed decisions....