Jan 1, 2009 | Research library
This paper emphasizes the growing global interconnectivity and reliance on information systems (IS) in multiple sectors such as business and government. As institutions become more globally linked and dependent on automated control systems, the vulnerability of these...
Dec 9, 2008 | Journal article, Research library
The purpose of this paper is to develop a research framework and empirically analyze the factors that motivate the consumers to adopt and use anti-spyware tools when they are faced with security threats.
Dec 2, 2008 | Research library
In the new era of a ubiquitously networked world, security measures are only as good as their weakest link. Home computers with access to the Internet are one of the weaker links as they are typically not as well protected as computers in the corporate world....
Nov 21, 2008 | Research library
Recently, the role of human behavior has become a focal point in the study of information security countermeasures. However, few empirical studies have been conducted to test social engineering theory and the reasons why people may or may not fall victim, and even...
Oct 1, 2008 | Research library
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. Cybersecurity culture is a set of the attitudes, assumptions, beliefs, values and knowledge that people use in their interaction with the...
Sep 26, 2008 | Research library
This paper focuses on victims of financial crimes. It describes the impact of this financial crime, the need for services to assist both victims and their families and 12 programs that assist the victims of financial crime.