May 3, 2011 | Research library
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Various anti-phishing techniques attempt to mitigate such attacks. Domain highlighting is one...
Apr 23, 2011 | Research library
Interventions and policies to change behaviour can be usefully characterised by means of a BCW comprising: a ‘behaviour system’ at the hub, encircled by intervention functions and then by policy categories. Research is needed to establish how far the BCW...
Apr 15, 2011 | Research library
Computer security warnings are intended to protect users and their computers. However, research suggests that users frequently ignore these warnings. The authors describe a study designed to gain insight into how users perceive and respond to computer alerts....
Mar 24, 2011 | Research library
Effective user security awareness campaign can greatly enhance the information assurance posture of an organization. Information security includes organizational aspects, legal aspects, institutionalization and applications of best practices in addition to security...
Mar 1, 2011 | Research library
This study evaluated the digital skills of 25,000 European internet users aged 9-16 by examining their online activities, skills, and self-efficacy. It was found that the range of digital skills is linked to the variety of online activities. However, many children in...
Feb 1, 2011 | Research library
Deterrence theory is one of the most widely applied theories in information systems (IS) security research, particularly within behavioral IS security studies. Based on the rational choice view of human behavior, the theory predicts that illicit behavior can be...