Mar 13, 2007 | Journal article, Research library
Dr Steven Furnell at Plymouth University has conducted research, which looks at why some computer users still can’t tell the difference between an official email and a phishing scam. Steven Furnell looks at the increasing sophistication of phishing emails and...
Feb 3, 2007 | Research library
Fear appeals have long been used in persuasive messages to motivate people to perform adaptive behaviors. This research explored the influence of a fear appeal message concerning breast cancer on attitude accessibility. Messages advocating the efficacy of breast...
Feb 1, 2007 | Research library
Although many of the concepts included in cyber security awareness training are universal, such training often must be tailored to address the policies and requirements of a particular organization. In addition, many forms of training fail because they are rote and do...
Jan 28, 2007 | Research library
Wireless networks are rapidly becoming ubiquitous but are often insecure and leave users responsible for their own security. We empirically study whether users are successfully securing their client computers when using wireless networks. Automated techniques are used...
Jan 26, 2007 | Research library
This whitepaper discusses human vulnerabilities in full, including what they are, why they occur, how they can be mitigated, the challenges of mitigation and potential areas for further research.
Jan 26, 2007 | Research library
A paper on the factors that make phishing emails and web pages appear authentic and on the factors that make legitamate content appear dubious. Authors draw nine conclusions.