Jan 1, 2010 | Research library
Employee violations of IS security policies is recognized as a key concern for organizations. Although interest in IS security has risen in recent years, little empirical research has examined this problem. To address this research gap, this dissertation identifies...
Jan 1, 2010 | Research library
This article reports human memories as reconstructed fragments of information, as opposed to recorded feedback. According to the article false memories are easily recalled, jeopardising eyewitness reports. Eyewitness reports should therefore perhaps be used with...
Dec 26, 2009 | Journal article, Research library
End users are frequently criticised as the sources of bad security practice, and it is suggested they might take the issue more seriously if they experienced a breach. An option for enabling this would be for security administrators to deliberately create conditions...
Dec 19, 2009 | Research library
By using the protection motivation theory, this article tests a model of password protection intentions for online users. Hypotheses are proposed concerning the intention to engage in good password practices. Data were collected from 182 college students of 3...
Dec 1, 2009 | Research library
We present the design and evaluation of PhishDuck, an anti-phishing tool for email clients. Phishduck presents a interfaces to users if they click on suspicious emails, and helps guide them towards making safe decisions. We present two different interfaces, a warning...
Nov 17, 2009 | Research library
This study looks into how mood and audience influence gambling behaviours. Although mood seems to have no effect on gambling behavior, participants with a negative mood prior to gambling report more positive moods after gambling. Those with positive and neutral moods...