This survey by the Pew Research Center’s Internet Project asked 1,002 adults about their Internet habits. It is laid out in five parts: the quest for anonymity online; concerns about personal information online; who internet users are trying to avoid, the information...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
The online dating romance scam: The psychological impact on victims – both financial and non-financial
This paper finds for most people, the loss of a relationship following the culmination of an online dating scam is more unsettling than any financial losses suffered. According to the paper, few victims of online dating scams find a sufficient way to cope following...
On cyber security, technology and human behaviors
According to this post, it’s important to take an innovative approach when it comes to cyber security as conventional means (such as posters or one-time awareness training) do not change behavior. Further, the post suggests risk-mitigating behaviors must become...
Implicit measures and online risks
Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and...
Risk, risk perception, risk management – A review of the literature
Risks have become an integral part of our society. In this context, the aim of this paper is to provide a summary of the findings of risk research conducted in different fields of study and to trace the effect of these findings on risk management practices. The basic...
Social influence or personal preference? Examining the determinants of usage intention across social media with different sociability
Previous studies have identified that social influence and personal preference are two key mechanisms to understand users’ social media adoption behavior. Whether or not these two mechanisms play equal roles under different contexts has rarely been empirically...
Identifying how firms manage cyber security investment
A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not...
HP security research – Cyber risk report 2015
An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...
Cyber security: A failure of imagination by CEOs
This paper discusses the involvement of CEOs in cyber security. Backed up by strong research, it explores the current state of CEO involvement, addresses some of the challenges involved in CEO involvement and offers four golden rules of cyber security.
Two-factor authentication: Is the world ready? Quantifying 2FA adoption
This paper is the outcome of a study which explores the state of two-factor authentication (2FA), specifically focussing on the largest existing 2FA service, offered by Google.