Mar 10, 2012 | Research library
A report on the findings of an ambitious project aiming to understand the behaviours involved in online grooming across Europe. The report concludes groomers’ behaviours vary wildly and that, by facilitating anonymity, technology helps groomers justify their...
Mar 9, 2012 | Journal article, Research library
A thorough paper reporting the findings of Shari Pfleeeger and Deanna Caputo’s research into blending behavioural science and cyber security. Following an introduction into the relationship between human behaviour and cyber security, the paper discusses proven...
Mar 9, 2012 | Research library
The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. This study was a...
Mar 1, 2012 | Research library
This study will explore variances in password strength across demographics such as age, gender, ethnicity, and education level; organizational password rules; and security training. It also determines the degree to which the individual perception of security threats...
Mar 1, 2012 | Research library
This study examined contributing factors in the relationship between organizational culture and employee attitudes towards information security policy. Guiding the investigation was the question: To what extent, if any, is there a relationship between an...
Feb 12, 2012 | Research library
Research examining the information security behavior of individuals with respect to risk has focused primarily on only a handful of constructs; most of which have their roots in Protection Motivation Theory (PMT). However, there is still a lot we do not know about the...