Select Page

Research Library

The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.

To see the latest studies from pioneering academics, scroll down.

Anonymity, privacy, and security online

This survey by the Pew Research Center’s Internet Project asked 1,002 adults about their Internet habits. It is laid out in five parts: the quest for anonymity online; concerns about personal information online; who internet users are trying to avoid, the information...

On cyber security, technology and human behaviors

According to this post, it’s important to take an innovative approach when it comes to cyber security as conventional means (such as posters or one-time awareness training) do not change behavior. Further, the post suggests risk-mitigating behaviors must become...

Implicit measures and online risks

Information systems researchers typically use self-report measures, such as questionnaires to study consumers’ online risk perception. The self-report approach captures the conscious perception of online risk but not the unconscious perception that precedes and...

Risk, risk perception, risk management – A review of the literature

Risks have become an integral part of our society. In this context, the aim of this paper is to provide a summary of the findings of risk research conducted in different fields of study and to trace the effect of these findings on risk management practices. The basic...

Identifying how firms manage cyber security investment

A report on a set of semi-structured interviews that aimed to determine how firms make decisions regarding their cyber security investment. The report finds that senior management understand the importance of cyber security, that budgeting for cyber security is not...

HP security research – Cyber risk report 2015

An overview of the threat landscape of HP in 2014. This report outlines the threats that occurred and the changes that were made to improve the resilience of the software company HP. The report aimed to provide an understanding of potential threats and interventions...

Cyber security: A failure of imagination by CEOs

This paper discusses the involvement of CEOs in cyber security. Backed up by strong research, it explores the current state of CEO involvement, addresses some of the challenges involved in CEO involvement and offers four golden rules of cyber security.