This essay outlines common types of internet fraud, discusses the psychological techniques that criminals use to conduct internet fraud and proposes some counter-fraud measures, including educational and technological solutions.
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
This study examined the relevance and limitations of research on the benefits of choice. The study finds that, while choice generally seems beneficial, Asian American children were, in fact, more intrinsically motivated when choices were made for them.
Across four studies, East Asians showed a preference for conformity while European Americans demonstrated a preference for uniqueness. Researchers suggest the results highlight the relationship between individual preferences and the adoption and perpetuation of...
The researchers review 150 studies on the difference in risk-taking behaviour between males and females, concluding that males are typically more risk-seeking than females but that the gap appears to be shrinking over time.
Cross-cultural differences in risk perception, but cross-cultural similarities in attitudes towards perceived risk
This study into the risk preferences of people from various nations found Chinese people and Americans both exhibited the same appetite for risk, but that perceived risk varied greatly between the two cultures.
Researchers discuss theories and research on the differences in what we see and what we perceive in an effort to further study on why we don't always perceive what we see, and why we sometimes perceive things we don't see.
Following three experiments that manipulated participants' self-image, researchers suggest stereotyping may be a common way to maintain one's self-image.
IT security professionals strive to instill a systematic approach to security management through awareness training, procedures and policies that govern end user computing. In order to better understand end users’ attitudes about performing relevant security...
This paper reviews literature on computer-mediated communication up to its 1996 publication date, explaining that computer-mediated communication can both depreciate as well as enhance how personal a communication is.
A robust meta-analysis of social loafing; the tendency for individuals to avoid putting effort into a task when working collectively over individually. Factors that moderate social loafing are also discussed.