Sep 6, 2015 | Research library
Technological solutions alone can’t assure information security. User behavior plays a pivotal role in this field. Given its vast expanse, the Internet offers numerous possibilities for security infringements. Attackers utilize various methods to alter the...
Sep 5, 2015 | Research library
This survey by the Pew Research Center’s Internet Project asked 1,002 adults about their Internet habits. It is laid out in five parts: the quest for anonymity online; concerns about personal information online; who internet users are trying to avoid, the information...
Sep 3, 2015 | Research library
This paper finds for most people, the loss of a relationship following the culmination of an online dating scam is more unsettling than any financial losses suffered. According to the paper, few victims of online dating scams find a sufficient way to cope following...
Sep 2, 2015 | Research library
According to this post, it’s important to take an innovative approach when it comes to cyber security as conventional means (such as posters or one-time awareness training) do not change behavior. Further, the post suggests risk-mitigating behaviors must become...
Sep 1, 2015 | Research library
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and...
Sep 1, 2015 | Research library
This paper aims to summarize the findings of risk research across various fields and examine their impact on risk management practices. The fundamental approaches to risk discussed in this paper suggest that the concepts of probability used in studying processes in...