Aug 1, 2004 | Research library
Information security is a multibillion-dollar problem faced by commercial and government organizations around the world. Through their adverse effects on organizational information systems, malware, hackers, and malicious insiders jeopardize organizations’...
Jul 1, 2004 | Research library
This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause serious flaws in the plan. These 10 aspects can be used as a checklist by management to...
Apr 24, 2004 | Research library
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy policies have become almost ubiquitous. An estimated 77% of websites now post a privacy...
Apr 20, 2004 | Research library
This study investigates the relationships between psychological ownership and work attitudes and behaviors. Hypotheses were developed based on the psychology of possession and psychological ownership literatures. These hypotheses were tested using data from three...
Apr 13, 2004 | Research library
Modern theories in cognitive psychology and neuroscience indicate that there are two fundamental ways in which human beings comprehend risk. The “analytic system” uses algorithms and normative rules, such as probability calculus, formal logic, and risk assessment. It...
Mar 15, 2004 | Journal article, Research library
This paper uses an information-processing model of deception detection to understand the reasons underlying Internet consumers’ success and failure at detecting forms of intentional deception that occur on the Internet. Eighty MBA students visited either a real...