Based on focus group interviews, we considered how young adults’ attitudes about privacy can be reconciled with their online behavior. The “privacy paradox” suggests that young people claim to care about privacy while simultaneously providing a great deal of personal...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
Data integrity attacks and defenses for Intel lab sensor network
Wireless sensor networks have been increasingly popular and they have been deployed in a wide range of areas including transportation system, healthcare, robotics, and smart home. Wireless sensor networks have facilitated our life using the remote sensing ability....
Awareness is only the first step
Improving cyber security awareness is often assumed to improve cyber security, however this paper suggests it's necessary for people to be engaged in cyber security in order to make people a robust cyber defence. The paper builds a model for engaging people in cyber...
Password security: An empirical study
One of the most common control mechanisms for authenticating users of computerized information systems is the use of passwords. Despite the widespread use of passwords, little attention has been given to the characteristics of their actual use. This paper addresses...
Online privacy tools for the general public
Taking into account the increasing need for online data protection and the availability of numerous Privacy Enhancing Technologies (PETs) for internet and mobile users, ENISA conducted, under its 2015 work programme, a study on online privacy tools, aiming at...
Awareness, behaviour and culture: The ABC in cultivating security compliance
A significant volume of security breaches occur as a result of human aspects and it is consequently important for these to be given attention alongside technical aspects. Researchers have argued that security culture stimulates appropriate employees’ behavior towards...
Will the “Phisher-Men” reel you in?: Assessing individual differences in a phishing detection task
Phishing is an act of technology-based deception that targets individuals to obtain information. To minimize the number of phishing attacks, factors that influence the ability to identify phishing attempts must be examined. The present study aimed to determine how...
Smart insiders: Exploring the threat from insiders using the Internet-of-Things
The Internet-of-Things (IoT) is set to be one of the most disruptive technology paradigms since the advent of the Internet itself. Market research company Gartner estimates that around 4.9 billion connected things will be in use in 2015, and around 25 billion by 2020....
Cybersecurity’s human factor: Lessons from the Pentagon
The article shares the US Defense Department’s approach to addressing the human side of cyber security, allowing business leaders to apply the same framework to their own organisations.
Information security conscious care behaviour formation in organizations
Experts believe that technology cannot solely guarantee a secure environment for information. Users' behaviour should be considered as an important factor in this domain. The Internet is a huge network with great potential for information security breaches. Hackers...