Sep 17, 2008 | Research library
Organizations and individuals are increasingly impacted by misuses of information that result from security lapses. Most of the cumulative research on information security has investigated the technical side of this critical issue, but securing organizational systems...
Sep 10, 2008 | Research library
This article summarises the cognitive biases that facilitate social engineering scams, which can be used to develop more effective cyber security awareness campaigns.
Sep 9, 2008 | Journal article, Research library
This paper finds individuals comply with security practices up to a certain point only, after which point compliance wains. Organisations can influence an individual’s perception of where the compliance threshold lies so long as they know of and can manipulate...
Sep 2, 2008 | Research library
This paper introduces a novel approach to access control, particularly for single-user systems, that takes into account the entire history of user and program actions to enhance the precision and expressiveness of access control policies. Current access control...
Sep 1, 2008 | Research library
“Your computer is infected with spyware. Click OK to download the necessary anti-spyware updates.” This type of popup warning is a common deceptive strategy employed by creators of malware and spyware to trick unsuspecting internet users into downloading...
Aug 26, 2008 | Research library
In this study, males who thought others of equal status were watching and judging their decisions were more likely to persue a high-risk, high-reward means of recouping a financial loss over a no risk, low gain means with equal expected value. The results suggest...