Select Page

Research Library

The world’s first globally accessible archive of research into the human aspect of cyber security and behavioral science as applied to cyber security awareness and online behavioral change.

Probing the front Lines: Pollworker perceptions of security & privacy

Voting technologies have undergone intense scrutiny in recent years. In contrast, the human components of these socio-technical systems, including the policies and procedures that guide and bind behavior have received less attention. To begin to understand pollworker...

Fear of cyber-identity theft and related fraudulent activity

Identity theft and related fraudulent activities affect approximately one in twenty-five adults each year across western societies. The Internet provides a new avenue for obtaining identity tokens and identifying information and increases the scale on which identity...

European online grooming project: Final report

A report on the findings of an ambitious project aiming to understand the behaviours involved in online grooming across Europe. The report concludes groomers' behaviours vary wildly and that, by facilitating anonymity, technology helps groomers justify their actions....

Leveraging behavioral science to mitigate cyber security risk

A thorough paper reporting the findings of Shari Pfleeeger and Deanna Caputo's research into blending behavioural science and cyber security. Following an introduction into the relationship between human behaviour and cyber security, the paper discusses proven and...

Why do some people manage phishing e-mails better than others?

The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. This study was a...

Password security: What factors influence good password practices

This study will explore variances in password strength across demographics such as age, gender, ethnicity, and education level; organizational password rules; and security training. It also determines the degree to which the individual perception of security threats...