Jan 9, 2008 | Research library
Objective: Without standardized definitions of the techniques included in behavior change interventions, it is difficult to faithfully replicate effective interventions and challenging to identify techniques contributing to effectiveness across interventions. This...
Jan 1, 2008 | Research library
Theory provides a helpful basis for designing interventions to change behaviour but offers little guidance on how to do this. This paper aims to illustrate methods for developing an extensive list of behaviour change techniques (with definitions) and for linking...
Jan 1, 2008 | Research library
Recent reports indicate a shortage of approximately 20,000- 30,000 qualified cyber-security specialists in the US Public Sector alone despite being one of the best financially compensated technology-related domains. Against ever evolving cyber-threats the need to...
Jan 1, 2008 | Research library
SoHo users are increasingly faced with the dilemma of applying appropriate security mechanisms to their computer with little or no knowledge of which countermeasure will deal with which potential threat. As problematic as it may seem for individuals to apply...
Jan 1, 2008 | Research library
This paper presents an experimental study involving participants using an online analytical processing software product. Following usage, the experimental group was informed that the software contained spyware. Responses from the experimental and control groups were...
Jan 1, 2008 | Research library
The spread of broadband Internet has resulted in the increase of spyware and adware. This study highlights their damaging effects and proposes a model that captures defensive measures adopted by Internet users. Specifically, our model indicates that knowledge has a...