Jan 1, 2015 | Research library
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice...
Jan 1, 2015 | Research library
Information security risks are frequently assessed in terms of the probability that a threat will be realized and the severity of the consequences of a realized threat. In methods and manuals, the product of this probability and severity is often thought of as the...
Dec 8, 2014 | Journal article, Research library
End users are said to be “the weakest link” in information systems (IS) security management in the workplace. They often knowingly engage in certain insecure uses of IS and violate security policies without malicious intentions. Few studies, however, have...
Dec 3, 2014 | Research library
Internet users face large numbers of security warnings, which they mostly ignore. To improve risk communication, warnings must be fewer but better. We report an experiment on whether compliance can be increased by using some of the social-psychological techniques the...
Nov 27, 2014 | Research library
Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The...
Nov 27, 2014 | Research library
This chapter presents a framework for developing programs aimed at promoting safer behavior among adolescents. It introduces the concept of ‘involvement’ to the protection motivation theory literature, highlighting its importance in devising effective...