The purpose of this paper is to survey, explore and inform researchers about the previous methodologies applied, target audience and coverage of previous assessment of cybersecurity awareness by capturing, summarizing, synthesizing and critically comment on it. It is...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
“ My data just goes everywhere : ” User mental models of the internet and implications for privacy and security
Many people use the Internet every day yet know little about how it really works. Prior literature diverges on how people’s Internet knowledge affects their privacy and security decisions. We undertook a qualitative study to understand what people do and do not know...
Studying safe online banking behaviour : A protection motivation theory approach
In this paper, a conceptual research model is proposed to study safe online banking behaviour. The Protection Motivation Theory functions as the core of the model. The model is extended with additional variables, making it suitable for the online banking context. The...
Too much knowledge? Security beliefs and protective behaviors among United States internet users
Home computers are frequently the target of malicious attackers because they are usually administered by non-experts. Prior work has found that users who make security decisions about their home computers often possess different mental models of information security...
Nudging towards security: Developing an application for wireless network selection for android phones
People make security choices on a daily basis without fully considering the security implications of those choices. In this paper we present a prototype application which promotes the choice of secure wireless network options, specifically when users are unfamiliar...
Evolvement of information security research on employees behavior: A systematic review and future direction
Information Security (IS) is one of the biggest concerns for many organizations. This concern has led many to focus a huge effort into studying different IS areas. One of these critical areas is the human aspect, where investigation of employees' behaviors has emerged...
The design of phishing studies: Challenges for researchers
In this paper, a role play scenario experiment of people's ability to differentiate between phishing and genuine emails demonstrated limitations in the generalisability of phishing studies. This involves issues around the priming of participants and the diversity of...
A protection motivation theory approach to improving compliance with password guidelines
Usernames and passwords form the most widely used method of user authentication on the Internet. Yet, users still find compliance with password guidelines difficult. The primary objective of this research was to investigate how compliance with password guidelines and...
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
Standards and best practices for information security awareness programs focus on the content and processes of the programs, without taking into consideration how individuals internalize security-related information and how individuals make security related decisions....
Online safety begins with you and me: Convincing Internet users to protect themselves
Despite frequent reports of losses due to computer security breaches, many individuals still do not follow basic safety precautions. Understanding the mental processes that motivate users to follow safe practices is key to strengthening this weak link in the security...