Jan 10, 2010 | Research library
This paper discusses the paradox where computer users, despite being aware of spyware, often do not take measures to protect against it. A recent study delves into the reasons behind this indifference, suggesting that enhancing users’ confidence in installing...
Jan 9, 2010 | Journal article, Research library
In this study, participants performed a computer memory task while compliance to three safety measures was monitored. Compling with indirect warnings – that is, warnings triggered by entities other than researchers – was not significantly different to compliance with...
Jan 9, 2010 | Research library
This paper proposes a research method that investigates the risk perceptions of computer endusers relating to organisational Information Security (InfoSec) and the situational factors that influence these perceptions. This method uses the Repertory Grid Technique...
Jan 1, 2010 | Research library
The application of information security technologies do not always result in improved security. Human factors play a significant role in computer security; factors such as individual difference, cognitive abilities and personality traits can impact on behaviour....
Jan 1, 2010 | Research library
Nowadays, information becomes a very valuable thing that is owned by every individual, organization or company. Various efforts are made to maintain the security of information owned. There are still many people who pay less attention to the danger or threat to the...
Jan 1, 2010 | Research library
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishing susceptibility and the effectiveness of several anti- phishing educational materials....