Jul 10, 2016 | Research library
This article explains what ‘behavioural nudging’ is and offers examples of how nudging could be used to encourage desired security behaviours.
Jul 4, 2016 | Research library
The Internet-of-Things (IoT) ushers in a new age where the variety and amount of connected, smart devices present in the home is set to increase substantially. While these bring several advantages in terms of convenience and assisted living, security and privacy risks...
Jun 22, 2016 | Research library
Organisational security policies are often written without sufficiently taking in to account the goals and capabilities of the employees that must follow them. Effective security management requires that security managers are able to assess the effectiveness of their...
May 15, 2016 | Research library
We present the results of an online survey of smartphone unlocking (N = 8, 286) that we conducted in eight different countries. The goal was to investigate differences in attitudes towards smartphone unlocking between different national cultures. Our results show that...
May 15, 2016 | Research library
The “streetlight effect”—originally less flatteringly referred to as the “drunkard’s search”—is a form of observational bias. It recognizes our tendency to look for solutions to problems where it’s easiest to find them, such as under a streetlight. In this article, we...
May 7, 2016 | Research library
This paper delves into the process users undergo when updating their software, including both the positive and negative experiences they encounter. Software updates, which can alter functionality by fixing bugs, changing features, and modifying the user interface, can...