Jan 8, 2007 | Research library
It is widely agreed that a key threat to information security is caused by careless employees who do not adhere to the information security policies of their organizations. In order to ensure that employees comply with the organization’s information security...
Jan 1, 2007 | Research library
This study is a large scale investigation of trust manipulation tactics used by phishing web sites and email messages. The experiment focuses on media authenticity evaluations, rather than content credibility with the assumption that its authors are known. It tests...
Jan 1, 2007 | Research library
The concept of an ‘information security culture’ is relatively new. A review of published research on the topic suggests that it is not the information security panacea that has been suggested. Instead it tends to refer to a range of existing techniques...
Dec 1, 2006 | Research library
The key threat to IS security is constituted by careless employees who do not comply with IS security policies. To ensure that employees comply with organizations’ IS security procedures, a number of IS security policy compliance means have been proposed in the...
Nov 14, 2006 | Research library
This paper emphasizes that an information security solution is a crucial element for any organization. One of the main challenges in integrating information security into an organization is the actions and behaviors of employees. For information security to become...
Jul 26, 2006 | Research library
This study reports on what everday user do when they come across suspicious emails. An analysis suggests people can manage risks they’re familiar with but are unable to extrapolate their strategies to deal with unfamiliar risks.