Aug 13, 2012 | Research library
This paper tests the effects of depth of processing on both working memory and long-term memory. The results indicate that the depth of processing had little effect on working memory tests; however, the typical benefits of semantic processing was seen in long term...
Aug 13, 2012 | Research library
Findings from this paper show that most password managers are easily broken and use storage formats that are easily accessible, even to weak adversaries. The work does, however, show that it is possible to theoretically construct a format that is secure, that’s usable...
Aug 12, 2012 | Research library
Research problem: Phishing is an email-based scam where a perpetrator camouflages emails to appear as a legitimate request for personal and sensitive information. Research question: How do individuals process a phishing email, and determine whether to respond to it?...
Jul 31, 2012 | Research library
The home computer user is often said to be the weakest link in computer security. They do not always follow security advice, and they take actions, as in phishing, that compromise themselves. In general, we do not understand why users do not always behave safely,...
Jul 27, 2012 | Research library
Email plays an important role in the digital economy but is threatened by increasingly sophisticated cybercrimes. A number of security services have been developed, including an email authentication service designed to cope with email threats. It remains unknown how...
Jul 20, 2012 | Research library
Researchers test how power and self-focus moderate the effectiveness of social influence in decision-making. They find those with more power and self-focus to be less affected by social influence when making ethical decisions.