Jan 1, 2014 | Research library
One of the largest preventable sources of computer compromise is old software that has not been updated with the latest security-related updates. Security updates correct known vulnerabilities in software and protect the computer from future attacks. However, users do...
Jan 1, 2014 | Research library
In this chapter, the author investigates the relationships between unethical behaviors from the viewpoint of information security and organizational commitment by analyzing micro data collected from a survey the author conducted in March 2012. As a result, at first,...
Jan 1, 2014 | Research library
Given the diffusion of the Social Web and increased disclosure of personal information online, the ‘privacy paradox’ suggests that while Internet users are concerned about privacy, their behaviors do not mirror those concerns. This study investigates the potential...
Jan 1, 2014 | Research library
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a...
Dec 28, 2013 | Research library
We carried out two behavioural experiments to investigate if and how cybersecurity decision-making responses are influenced by gain-loss framing and the prominence of a primed recall of a previous experience. In the first experiment, we adjusted the frame (gain vs....
Dec 15, 2013 | Research library
Within nine different research projects about phishing protection this thesis gives answers to ten different research questions in the areas of creating new phishing detectors (phishing detection) and providing usable user feedback for such systems (user...