Apr 29, 2017 | Research library
Security managers define policies and procedures to express how employees should behave to ‘do their bit’ for information security. They assume these policies are compatible with the business processes and individual employees’ tasks as they know...
Apr 24, 2017 | Research library
Wearable and personal devices are becoming more and more part of people’s everyday lives. These devices produce enormous amount of personal data which are handled by third parties as authorized by the user. However, such third parties may be able to infer...
Apr 10, 2017 | Research library
This blog post explores how organisations can create, maintain and improve their security culture and addresses the questions one may have in regards to security culture. The author highlights three phenomena that actively prevent affected organisations from achieving...
Apr 9, 2017 | Research library
The recent expansion of Internet of Things (IoT) and the growing trends towards a healthier lifestyle, have been followed by a proliferation in the use of fitness-trackers in our daily life. These wearable IoT devices combined with the extensive use by individuals of...
Mar 10, 2017 | Research library
This blog post emphasises the need for organisation-wide security awareness and offers five recommendations that can improve personal security practises and defend organisations against cyber threats.
Mar 9, 2017 | Journal article, Research library
An introduction to the research of Jason Hong, Sauvik Das, Tiffany Hyun-Jin Kim and Laura Dabbish, who are investigating how social influence affects cyber security and testing how social influence techniques can improve people’s awareness and knowledge of...