Nov 23, 2012 | Research library
Phishing, a pervasive form of social engineering crime on the web, presents significant challenges due to its escalating occurrences and evolving techniques. This study reviews existing phishing literature and countermeasures to assess the progress and advancement of...
Oct 31, 2012 | Journal article, Research library
Computer self-efficacy (CSE) has been a popular and important construct in information systems research for more than two decades. Although CSE researchers have conducted extensive qualitative reviews, quantitative analyses are lacking for studies of the relationships...
Oct 15, 2012 | Journal article, Research library
We proposed and empirically tested a mediating model for examining the effects of multilevel sanctions on preventing information security violations in the workplace. The results of the experiment suggested that personal self-sanctions and workgroup sanctions have...
Oct 2, 2012 | Research library
Botnets have become a vital part of underground economy and botherders are actively looking for new recruits to join their bot army. A lapse by an end user or an administrator in terms of not updating their software enables the botherder to achieve this objective. In...
Sep 15, 2012 | Report, Research library
The underlying premise of the Millennial Cybersecurity Project is that the best way to communicate with millennials is through the language of technology. Most organizations today employ communications strategies that are better suited to previous generations. Instead...
Sep 10, 2012 | Journal article, Research library
This study finds individuals with differing personality traits react differently to the same conditions, and thus cyber security training should be tailored based on individual needs.