Jul 18, 2014 | Research library
We explore Information and Communication Technology (ICT) security in a socio-technical world and focus in particular on the susceptibility to social engineering attacks. We pursue the question if and how personality traits influence this susceptibility. We use...
Jul 9, 2014 | Research library
When security updates are not installed, or installed slowly, end users are at an increased risk for harm. To improve security, software designers have endeavored to remove the user from the software update loop. However, user involvement in software updates remains...
Jul 9, 2014 | Research library
Taking a step beyond segmentation, privacy researchers have recently proposed privacy personalization or adaptation as an approach to assist users in their privacy decision making. Analyzing a number of datasets of users’ personal information disclosure behavior, we...
Jul 9, 2014 | Research library
Users need to keep track of many accounts and passwords. We conducted a series of interviews to investigate how users cope with these demanding tasks, and used Grounded Theory to analyze the interview results. We found that most users cope by reusing passwords and...
Jul 8, 2014 | Research library
This research aims to explore the key factors influencing an Internet user’s capacity to accurately identify a phishing website. We carried out quantitative research using a structured survey questionnaire and three experimental tasks. We gathered a total of 621...
Jul 4, 2014 | Research library
Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, hacktivists and advanced persistent threats. Although these threats can be harmful to an enterprise, a potentially more devastating and anecdotally more likely threat is...