Sep 10, 2014 | Research library
A large number of information security breaches at the workplace result from employees’ failure to comply with organizational information security guidelines. Recent surveys report that 78% of computer attacks appear in the form of viruses embedded in email...
Sep 8, 2014 | Research library
Researchers studied people’s resistance to persuasion, testing traditional explicit warnings against implicit priming warnings. They found simply reminding people of a situation in which someone attempted to influence them (ie, implicit priming) was as effective...
Sep 5, 2014 | Book, Research library
83 theories of behaviour change that could be used to design behaviour change interventions are discussed in detail.
Sep 3, 2014 | Research library
The modern era sees highly secure operating systems and software, resulting in cyber attackers focusing their efforts on exploiting human vulnerabilities to breach an organization’s information systems. Given the growing number of cyber attacks aimed at...
Sep 1, 2014 | Other, Research library
The distinguished expert in education and learning discusses the hierarchies of the three domains of learning. After discussing the different stages of cognivite learning, Owen Wilson discuess emotional learning and physical learning. The piece breaks each area of...
Sep 1, 2014 | Research library
This paper discusses the issue of employees often not reporting lost-time work-related injuries, despite it being a legal requirement in many jurisdictions. Based on data from 21,345 young part-time Canadian workers (55% male), it was found that 21% of respondents had...