Jul 4, 2015 | Research library
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and...
Jul 1, 2015 | Research library
Standards and best practices for information security awareness programs focus on the content and processes of the programs, without taking into consideration how individuals internalize security-related information and how individuals make security related decisions....
Jul 1, 2015 | Research library
This article delves into the persistent issue of individuals neglecting basic cybersecurity measures, despite the increasing reports of losses from security breaches. It emphasizes the importance of understanding the psychological factors that encourage users to adopt...
Jun 24, 2015 | Blogpost, Research library
This short blog post suggests cyber security awareness campaigns should not be run by IT but by human resources or standalone departments; that companies should quantify risks to guide cyber security investments; that awareness campaign effectiveness should be...
Jun 23, 2015 | Research library
This paper aims to challenge the assumption that the theory of planned behaviour (TPB) includes all constructs that explain information security policy compliance and investigates if anticipated regret or constructs from the protection motivation theory add...
Jun 14, 2015 | Research library
We explore the risks to security and privacy in IoT networks by setting up an inexpensive home automation network and performing a set of experiments intended to study attacks and defenses. We focus on privacy preservation in home automation networks but our insights...