Dec 7, 2015 | Research library
One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. Despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses...
Dec 1, 2015 | Research library
Taking into account the increasing need for online data protection and the availability of numerous Privacy Enhancing Technologies (PETs) for internet and mobile users, ENISA conducted, under its 2015 work programme, a study on online privacy tools, aiming at...
Dec 1, 2015 | Research library
A substantial proportion of security breaches stem from human factors, necessitating their consideration alongside technical elements. Scholars propose that a security culture fosters suitable employee behaviors leading to compliance. Consequently, organizations...
Oct 1, 2015 | Research library
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how...
Sep 21, 2015 | Research library
The Internet-of-Things (IoT) is set to be one of the most disruptive technology paradigms since the advent of the Internet itself. Market research company Gartner estimates that around 4.9 billion connected things will be in use in 2015, and around 25 billion by 2020....
Sep 10, 2015 | Research library
The article shares the US Defense Department’s approach to addressing the human side of cyber security, allowing business leaders to apply the same framework to their own organisations.