May 31, 2013 | Journal article, Research library
Past research on information technology (IT) security training and awareness has focused on informing employees about security policies and formal sanctions for violating those policies. However, research suggests that deterrent sanctions may not be the most powerful...
May 20, 2013 | Research library
As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper is to survey the state-of-the-art of security aspect of mobile social media, identify...
May 4, 2013 | Research library
Smartphone users increasingly download and install third-party applications from official application repositories. Attackers may use this centralized application delivery architecture as a security and privacy attack vector. This risk increases since application...
May 2, 2013 | Book, Research library
In chapter 7 of this book, Jonathan Haidt draws on economic and social psychological research to show how demonstrations of violations of care, fairness, loyalty, authority and sanctity can be used in different ways to promote both right wing and left wing politcal...
May 1, 2013 | Research library
This paper addresses the issue of cyberloafing, a widespread problem for many organizations. Some researchers propose a deterrence approach, using acceptable use policies for internet-based applications along with mechanisms to monitor employee internet usage and...
Apr 27, 2013 | Research library
We performed a laboratory experiment to study the privacy tradeoff offered by Facebook Connect: disclosing Facebook profile data to third-party websites for the convenience of logging in without creating separate accounts. We controlled for trustworthiness and amount...