Feb 26, 2009 | Journal article, Research library
This article examines the levels of security acceptance that can exist amongst employees within an organisation, and how these levels relate to three recognised levels of corporate culture. It then proceeds to identify several factors that could be relevant to the...
Jan 28, 2009 | Research library
While most technology adoption models have focused on beneficial technologies, Protection Motivation Theory (PMT) is a potentially valuable model for predicting adoption of protective technologies, which help users avoid harm from a growing number of negative...
Jan 26, 2009 | Research library
Authors discuss literature relating to self-disclosure on the internet, with a particular focus on disclosure via computer mediated communication and web-based forms. The authors posit further research questions.
Jan 26, 2009 | Research library
This paper investigates relationships between several courtroom variables, including expert witness confidence, juror personality, expert witness credibilty and juror sentencing. It finds expert witness confidence to have a significant effect on ratings of...
Jan 25, 2009 | Research library
This research aims to identify the factors that drive an employee to comply with requirements of the Information Security Policy (ISP) with regard to protecting her organization’s information and technology resources. Two different research models are proposed for an...
Jan 23, 2009 | Research library
It is becoming increasingly apparent that people are in fact the main weakness in regards to the protection of data. This paper explores in detail the areas in which personal details and sensitive data are socially engineered. The study investigated people’s...