This study is a large scale investigation of trust manipulation tactics used by phishing web sites and email messages. The experiment focuses on media authenticity evaluations, rather than content credibility with the assumption that its authors are known. It tests...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioral science as applied to cyber security awareness and online behavioral change.
Investigating the concept of information security culture
The concept of an 'information security culture' is relatively new. A review of published research on the topic suggests that it is not the information security panacea that has been suggested. Instead it tends to refer to a range of existing techniques for addressing...
Factors influencing protection motivation and IS security policy compliance
The key threat to IS security is constituted by careless employees who do not comply with IS security policies. To ensure that employees comply with organizations' IS security procedures, a number of IS security policy compliance means have been proposed in the past....
Cultivating an organizational information security culture
An information security solution should be a fundamental component in any organization. One of the major difficulties in achieving the assimilation of information into an organization is the actions and behaviour of employees. To ensure the integration of information...
Decision strategies and susceptibility to phishing
This study reports on what everday user do when they come across suspicious emails. An analysis suggests people can manage risks they're familiar with but are unable to extrapolate their strategies to deal with unfamiliar risks.
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse their passwords across multiple accounts, they increase their vulnerability;...
Imagined communities: Awareness, information sharing, and privacy on the facebook
Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study...
Practicing safe computing: Message framing, self-view, and home computer user security behavior intentions
With its global reach and pervasiveness, the Internet enables individuals to be more connected through electronic linkages than ever before. In such a highly inter-dependent network, individual behaviors can have far-reaching consequences that transcend borders...
Implementation Intentions and Goal Achievement: A Meta‐analysis of Effects and Processes
Holding a strong goal intention (“I intend to reach Z!”) does not guarantee goal achievement, because people may fail to deal effectively with self‐regulatory problems during goal striving. This review analyzes whether realization of goal intentions is facilitated by...
Accuracy of deception judgments
The authors review literature on deception studies and conclude people can correctly identify a lie (or a truth) 54% of the time. Authors also conclude that people are more accurate in judging audible than visible lies, that people appear deceptive when motivated to...