Oct 9, 2017 | Journal article, Research library
This research finds people are motivated to follow security procedures when they believe the procedures to be compulsory, and that both specifying policies and evaluating behaviors help position security policies as mandatory. It follows that specifying policies and...
Oct 9, 2017 | Research library
Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making...
Aug 20, 2017 | Research library
Embedded phishing exercises, which send test phishing emails, are utilized by organizations to reduce the susceptibility of its employees to this type of attack. Research studies seeking to evaluate the effectiveness of these exercises have generally been limited by...
Aug 10, 2017 | Research library
Packed with statistics and survey results, this paper profiles the ever-growing cyber threat landscape and offers advice to help address and overcome risks.
Jul 27, 2017 | Research library
The range of smart devices is expanding rapidly and increasingly collect and store personal information. While WRAP advocates for consumers to reuse these more often, the ability to eradicate the data at end of life is essential. A known barrier to the reuse of these...
Jul 11, 2017 | Research library
This paper offers an insight into what’s needed for an organisation to achieve a cyber risk aware culture and outlines the importance of establishing such a culture.