This study examined the ways in which Internet users construct their risk judgments about online privacy. The results, based on telephone survey data from a national probability sample in Singapore (n = 910), revealed that (a) individuals distinguish between two...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
MINDSPACE: Influencing behaviour through public policy
In an effort to aid policy makers seeking to change behaviour, a team of researchers summarise nine non-coercive influencers of human behaviour: the messanger (who a message comes from); incentives (such as loss avoidance); norms (what other people already do);...
The effect of online privacy information on purchasing behavior: An experimental study
Although online retailers detail their privacy practices in online privacy policies, this information often remains invisible to consumers, who seldom make the effort to read and understand those policies. This paper reports on research undertaken to determine whether...
Spyware: What influences college students to use anti-spyware tools?
The purpose of this paper is to better understand what factors influence college students to run anti-spyware tools, with the hopes of finding ways to better inform future students about the spyware epidemic and ways to combat spyware. In order to determine what...
Switch: How to change things when change is hard
According to this book's authors, we need only understand how our minds work to unlock shortcuts that can lead to long term behavour change. This book explores how our minds work and some shortcuts tha might be of use when seeking to change human behaviour.
An analysis of information security awareness within home and work environments
As technology such as the Internet, computers and mobile devices become ubiquitous throughout society, the need to ensure our information remains secure is imperative. Unfortunately, it has long been understood that good security cannot be achieved through technical...
Analyzing the adoption of computer security utilizing the health belief model
The home Internet user faces a hostile environment abundant in potential attacks on their computers. These attacks have been increasing at an alarming rate and cause damage to individuals and organizations regularly, and have the potential to cripple the critical...
Compliance with information security policies: An empirical investigation
Information security was the main topic in this paper. An investigation of the compliance to information security policies were discussed. The author mentions that the insignificant relationship between rewards and actual compliance with information security policies...
Impact of negative message framing on security adoption
This article examines the impact of negative message framing on security technology adoption. Based on previous studies, it was hypothesized that negatively-framed messages would have a greater effect on the adoption of security technologies which detect system abuse...
Quality and fairness of an information security policy as antecedents of employees’ security engagement in the workplace: An empirical investigation
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee’s security compliance in the workplace. Two factors were proposed as the antecedents of employees’ security compliance: ISP Fairness and ISP Quality. ISP...