Nov 15, 2009 | Journal article, Research library
The purpose of this paper is to measure and discuss the effects of an e-learning tool aiming at improving the information security knowledge, awareness, and behaviour of employees. Design/methodology/approach – The intervention study has a pre- and post-assessment of...
Nov 1, 2009 | Research library
The paper describes a practitioner’s view of the issue and the approaches used by BT to assess and address insider threats and risks. Proactive measures need to be taken to mitigate against insider attacks rather than reactive measures after the event. A key priority...
Nov 1, 2009 | Research library
The ultimate success of information security depends on appropriate information security practice behaviors by the end users. Based on social cognitive theory, this study models and tests relationships among self-efficacy in information security, security practice...
Oct 26, 2009 | Research library
This paper explores the ultimate causes of risk-taking and anti-social behavior. In particular, it explores the notion of such behaviors as evolutionary. It suggests a research program informed by life history analysis may reveal the ultimate causes of risk-taking and...
Oct 9, 2009 | Research library
The purpose of this paper based on compensation theory, is to incorporate perceived technical security protection into the theory of planned behavior and examined factors affecting end‐user security behaviors, specifically, compliance with security policies. The...
Sep 18, 2009 | Research library
With Rogers’ protection motivation theory as the theoretical framework, this study identified determinants of young adolescents’ level of privacy concerns, which, in turn, affects their resultant coping behaviors to protect privacy. Survey data from 144...