The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
This article reviews research on fear appeals before revising protection motivation theory based on the authors’ literature review.
This paper discusses four studies that allowed the authors to develop and validate a scale measuring an individual’s ‘need for cognition’ (that is, an indivdual’s tendency to engage in thinking and enjoy the practice of thinking things through). Notably, the studies revealed a positive correlation between need for cognition and general intelligence.
People are often faced with making judgements base on what they believe will happen. This paper proposes said beliefs are largely born from heuristics, including representativeness, availability and anchoring.
This paper presents a group process for conducting an exploration of the qualitative and quantitative elements, patterns and total structure of a health care problem under preliminary investigation. Reasons for employing the nominal group process as a pilot research instrument are given. The authors emphasize that it is appropriate for some problems but not for others.
According to this paper, the only way to motivate the employee is to give him or her challenging work and the responsibility for its completion. As carrot and stick methods – such as financial incentives or disciplinaries – are examples of neither, they should be overlooked in favour of job enrichment.
This paper discusses habituation; the process of having a decrease in response to a stimulus that is repeatedly presented to an individual. Factors that influence habituation are discussed, as is the neurobiology associated with the concept.
Social psychologist Stanley Milgram tests human obedience through an experiment which sees some participants instructed to inflict pain on fellow participants.
Edgar H. Schein defines organizational culture & leadership, explains how the two are intertwined and offers advice on triggering cultural change, making his text relevant for those wishing to implement a cyber secure culture.
This paper discusses three distinct concepts related to habits: the differences between habitual and non-habitual states of consciousness; a hierarchy of habits; and the development of habits which depends on repetition, attention, intensity of the experience, and the plasticity of the nervous system.