Feb 29, 2008 | Research library
Enterprises establish computer security policies to ensure the security of information resources; however, if employees and end-users of organisational information systems (IS) are not keen or are unwilling to follow security policies, then these efforts are in vain....
Feb 14, 2008 | Research library
Text passwords are the ubiquitous method of authentication, used by most people for most online services. Many people choose weak passwords that are vulnerable to attackers who simply guess all the passwords within the most probable password spaces. This paper...
Jan 26, 2008 | Research library
This study into the relationship between making choices and self-control demonstrated that making choices (such as between consumer goods) depletes subsequent self control.
Jan 10, 2008 | Research library
This book offers an introduction to security engineering in the 21st century, offering insights into the workings of 21st century security devices and considerations for those building new security devices.
Jan 9, 2008 | Journal article, Research library
As the paper’s prescriptive title suggests, the authors find linking a message to any important values an individual might hold increases the effectiveness of a message – which is likely to be of use when a message has little or no personal relevance to an...
Jan 9, 2008 | Journal article, Research library
Researchers studied the effectiveness of web browser phishing warnings by targeting 60 study participants with simulated email phishing attacks. 97% of study participants clicked a link in at least one simulated phishing email. When then presented with a passive web...