As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilisation of data generated by such applications. Most invasions of privacy are not intentional but due to designers inability to...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
When choice is demotivating: Can one desire too much of a good thing?
A paper that counters the popular notion of more choice being a good thing. Research in this paper suggests humans make better choices when offered less choice..
Dimensions of privacy concern among online consumers
The Federal Trade Commission (FTC) is one of many organizations studying influences on consumer privacy online. The authors investigate these influences, taking into consideration the current body of literature on privacy and the Internet and the FTC's core principles...
Privacy concerns and consumer willingness to provide personal information
The authors examine potential relationships among categories of personal information, beliefs about direct marketing, situational characteristics, specific privacy concerns, and consumers' direct marketing shopping habits. Furthermore, the authors offer an assessment...
Essential psychology for environmental policy making
This articles discusses environmental problems and how we can use psychology to address such problems. It then presents a model for doing so.
Individual differences in reasoning: Implications for the rationality debate?
Recent behavioural research has debunked the idea of humans as entirely rational. This paper suggests the gap between human behaviour and human cognition can in fact be explained not necessarily by irrationality but by: performance errors; computational limitations;...
Attitude change: Persuasion and social influence
This chapter reviews empirical and theoretical developments in research on social influence and message-based persuasion. The review emphasizes research published during the period from 1996-1998. Across these literatures, three central motives have been identified...
Users are not the enemy
In the late 90's, it was largely considered users were unmotivated and lazy when it came to cyber security. This UCL research suggested, actually, users compromised security systems through lack of security knowledge and non-user centric security mechanisms....
Effects of concurrent cognitive task loading on warning compliance behavior
This research examined whether increased cognitive task loading decreases warning compliance behavior. Participants performed a task in which they installed an external disk drive to a computer. Inside the accompanying owner's manual were a set of specific procedures...
Consumer trust in an internet store: A cross-cultural validation
Researchers study the relationship between trust and web purchases across cultures, finding trust in a website most likely increases web purchases across all cultures.