Apr 30, 2015 | Research library
Leadership styles play an important role to enhance employee’s information security awareness and may lead to proper information security compliance behavior. Therefore, the current study aims to investigate the indirect effect of leadership styles on user’s...
Apr 27, 2015 | Research library
According to national surveillance statistics, over 3 million employees are injured each year; yet, research indicates that these may be substantial underestimates of the true prevalence. The purpose of the current project was to empirically test the hypothesis that...
Apr 26, 2015 | Research library
Cloud computing has enabled a wide range of streaming multimedia applications and many HDMI based devices have emerged as a result. Chromecast is one of these devices that plugs into the HDMI port of a larger screen and turns it into a smart screen. With Chromecast,...
Apr 23, 2015 | Research library
Despite the plethora of security advice and online education materials offered to end-users, there exists no standard measurement tool for end-user security behaviors. We present the creation of such a tool. We surveyed the most common computer security advice that...
Apr 6, 2015 | Research library
This study aims to analyze the components of user experiences that cultivate trust and incite distrust on the internet, with a specific focus on the characteristics of websites that bolster trust or provoke distrust. We gathered data on users’ experiences during...
Mar 15, 2015 | Research library
Traditionally, organizations manage information security through policies and mechanisms that employees are expected to comply with. Noncompliance with security is regarded as undesirable, and often sanctions are threatened to deter it. But in a recent study, we...