Jan 10, 2013 | Research library
Researchers analyse 200 scam emails in search of patterns, and find alert and account verification, urgency, potential monetary gain, business proposals and mentions of large, unclaimed funds are repeatedly used in scam emails.
Jan 10, 2013 | Research library
This study examines the correlation between the Big Five personality traits (extraversion, agreeableness, openness, conscientiousness, and neuroticism) and email phishing response. It finds neuroticism to be most correlated with email phishing susceptibilty....
Jan 7, 2013 | Research library
Passwords remain the dominant authentication mechanism for information security. Unfortunately, research has shown that most passwords are highly insecure. Given the risks of using weak passwords, there is a need to effectively motivate users to select strong...
Jan 2, 2013 | Research library
Today’s organizations are highly dependent on information management and processes. Information security is one of the top issues for researchers and practitioners. In literature, there is consent that employees are the weakest link in IS security. A variety of...
Jan 1, 2013 | Research library
Cybersecurity is a national priority in this big data era. Because of negative externalities and the resulting lack of economic incentives, companies often underinvest in security controls, despite government and industry recommendations. Although many existing...
Dec 5, 2012 | Research library
The present article reports a survey conducted to identify the practices on passwords usage, focusing particularly on memory limitations and the use of passwords across individuals with different age and education backgrounds. A total of 263 participants were...