Jan 9, 2014 | Report, Research library
Behavioural change theory suggests influencers of behavioural change include environmental factors (such as technological design), social influencers (such as peers or family) and personal influencers (such as what we know and believe). Using the MINDSPACE framework...
Jan 9, 2014 | Research library
Information security culture guides how things are done in organization in regard to information security, with the aim of protecting the information assets and influencing employees’ security behavior. In this paper, we review key literature on information security...
Jan 6, 2014 | Research library
Passwords have long been the preferred method of user authentication, yet poor password practices cause security issues. The study described in this paper investigates how user perceptions of passwords and security threats affect intended compliance with guidelines...
Jan 5, 2014 | Journal article, Research library
Software engineering researcher Shari Lawrence Pfleeger and her co-authors review the latest psychological research on moral values and habit formation, discussing how principles and theories can be leverages to encourage people to behave in a cyber secure manner....
Jan 3, 2014 | Research library
This paper delves into the process of how individuals acquire, assess, and process data, specifically examining the psychology of risk perception to pinpoint essential factors for crafting effective messages. The application of the mental models methodology in risk...
Jan 1, 2014 | Research library
Online security advice aims to persuade users to behave securely, but appears to have limited effects at changing behaviour. We propose security advice targeted at end-users should employ visual rhetoric to form an effective, memorable, and persuasive method of...