Dec 17, 2002 | Research library
We propose a theory of securities market under‐ and overreactions based on two well‐known psychological biases: investor overconfidence about the precision of private information; and biased self‐attribution, which causes asymmetric shifts in investors’...
Dec 1, 2002 | Journal article, Research library
To illustrate the differing thoughts and emotions involved in guiding habitual and nonhabitual behavior, 2 diary studies were conducted in which participants provided hourly reports of their ongoing experiences. When participants were engaged in habitual behavior,...
Aug 15, 2002 | Journal article, Research library
Personal information is scarce in computer-mediated communication. So when information about the sender is attached with his or her e-mail, this could induce a powerful effect toward the receptor. Two experiments were carried out where males and females were solicited...
Aug 13, 2002 | Research library
An article exploring the optimal amount of money to invest to protect information. This model looks at the extent to which a piece of information is vulnerable and the potential loss that would occur if it was breached, and notes that companies should spend a small...
Aug 7, 2002 | Research library
Password security is essential to the security of information systems. Human fallibility makes it nearly impossible to follow all of the recommended rules simultaneously. A user with many different passwords, frequently changing, will be forced to write them down...
Jul 3, 2002 | Research library
Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an...