Voting technologies have undergone intense scrutiny in recent years. In contrast, the human components of these socio-technical systems, including the policies and procedures that guide and bind behavior have received less attention. To begin to understand pollworker...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioral science as applied to cyber security awareness and online behavioral change.
Simply blaming non-compliance is too convenient: What really causes information breaches?
Information breaches demand a vigorous response from organizations. The traditional response is to institute policies to constrain and control employee behavior. Information security policies inform employees about appropriate uses of information technology in an...
Fear of cyber-identity theft and related fraudulent activity
Identity theft and related fraudulent activities affect approximately one in twenty-five adults each year across western societies. The Internet provides a new avenue for obtaining identity tokens and identifying information and increases the scale on which identity...
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory
Employees’ failure to comply with IS security procedures is a key concern for organizations. Prior studies have not examined the influence of past and automatic behavior on employee decisions to comply. This is an important omission because past behavior has been...
Security education against Phishing: A modest proposal for a Major Rethink
User education must focus on challenging and correcting the misconceptions that guide current user behavior. To date, user education on phishing has tried to persuade them to check URLs and a number of other indicators, with limited success. The authors evaluate a...
European online grooming project: Final report
A report on the findings of an ambitious project aiming to understand the behaviours involved in online grooming across Europe. The report concludes groomers' behaviours vary wildly and that, by facilitating anonymity, technology helps groomers justify their actions....
Leveraging behavioral science to mitigate cyber security risk
A thorough paper reporting the findings of Shari Pfleeeger and Deanna Caputo's research into blending behavioural science and cyber security. Following an introduction into the relationship between human behaviour and cyber security, the paper discusses proven and...
Why do some people manage phishing e-mails better than others?
The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. This study was a...
Password security: What factors influence good password practices
This study will explore variances in password strength across demographics such as age, gender, ethnicity, and education level; organizational password rules; and security training. It also determines the degree to which the individual perception of security threats...
The influence of organizational culture on employee attitudes towards information security policy
This study examined contributing factors in the relationship between organizational culture and employee attitudes towards information security policy. Guiding the investigation was the question: To what extent, if any, is there a relationship between an...