Oct 3, 2013 | Research library
This paper discusses the common misconception of using the terms cyber security and information security interchangeably. While there is a significant overlap between the two, they are not entirely synonymous. The paper suggests that cyber security extends beyond the...
Oct 3, 2013 | Research library
System trespassing by computer intruders is a growing concern among millions of Internet users. However, little research has employed criminological insights to explore the effectiveness of security means to deter unauthorized access to computer systems. Drawing on...
Oct 3, 2013 | Research library
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the...
Oct 2, 2013 | Research library
In the technological world in which we live, access to the Internet is no longer a luxury. Rather, it is a necessity and a lifeline to many. The Internet is used, amongst other things for obtaining information, for doing business and for social networking. However,...
Sep 29, 2013 | Research library
It is widely agreed that a large amount of information systems (IS) security incidents occur in the workplace because employees subvert existing IS Security Policy (ISSP). In order to understand the factors that constrain employees from deviance and violation of the...
Sep 29, 2013 | Research library
Most prior research on preventing phishing attacks focuses on technology to identify and prevent the delivery of phishing emails. The current study supports an ongoing effort to develop a user-profile that predicts when phishing attacks will be successful. We sought...