Feb 11, 2012 | Research library
Researchers tested how harshness and unpredictability experienced in early childhood (age 0-5) and in later childhood (age 6-16) predicted sexual and risky behavior at age 23. Findings showed the strongest predictor of both sexual and risky behavior was an...
Feb 7, 2012 | Research library
To understand user behavior, researchers have examined intention to use, and system usage through some common conceptualizations such as actual usage, reported usage, and assessed usage. Although this entire body of research has produced important findings, it has yet...
Feb 4, 2012 | Research library
The Internet is a lucrative medium for criminals targeting Internet users. Most common Internet attacks require some form of user interaction such as clicking on an exploit link. Hence, the problem at hand is not only a technical one, but it also has a strong human...
Feb 1, 2012 | Research library
This research investigated information systems security policy (ISSP) compliance by drawing upon two relevant theories i.e. the theory of planned behavior (TPB) and the protection motivation theory (PMT). A research model that fused constituents of the aforementioned...
Jan 15, 2012 | Research library
Behaviour change is difficult to achieve and there are many models identifying the factors to affect such change but few have been applied in the security domain. This paper discusses the use of serious games to improve the security behaviour of end-users. A new...
Jan 15, 2012 | Research library
Users’ mental models of security, though possibly incorrect, embody patterns of reasoning about security that lead to systematic behaviors across tasks and may be shared across populations of users. Researchers have identified widely held mental models of security,...