This essay outlines common types of internet fraud, discusses the psychological techniques that criminals use to conduct internet fraud and proposes some counter-fraud measures, including educational and technological solutions.
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
Rethinking the value of choice: A cultural perspective on intrinsic motivation
This study examined the relevance and limitations of research on the benefits of choice. The study finds that, while choice generally seems beneficial, Asian American children were, in fact, more intrinsically motivated when choices were made for them.
Deviance or uniqueness, harmony or conformity? A cultural analysis
Across four studies, East Asians showed a preference for conformity while European Americans demonstrated a preference for uniqueness. Researchers suggest the results highlight the relationship between individual preferences and the adoption and perpetuation of...
Gender differences in risk taking: A meta-analysis
The researchers review 150 studies on the difference in risk-taking behaviour between males and females, concluding that males are typically more risk-seeking than females but that the gap appears to be shrinking over time.
Cross-cultural differences in risk perception, but cross-cultural similarities in attitudes towards perceived risk
This study into the risk preferences of people from various nations found Chinese people and Americans both exhibited the same appetite for risk, but that perceived risk varied greatly between the two cultures.
Inattentional blindness: An overview
Researchers discuss theories and research on the differences in what we see and what we perceive in an effort to further study on why we don't always perceive what we see, and why we sometimes perceive things we don't see.
Prejudice as self-image maintenance: Affirming the self through derogating others
Following three experiments that manipulated participants' self-image, researchers suggest stereotyping may be a common way to maintain one's self-image.
Increasing the persuasiveness of IT security communication: Effects of fear appeals and self-view
IT security professionals strive to instill a systematic approach to security management through awareness training, procedures and policies that govern end user computing. In order to better understand end users’ attitudes about performing relevant security...
Computer-mediated research: Impersonal, interpersonal & hyperpersonal interaction
This paper reviews literature on computer-mediated communication up to its 1996 publication date, explaining that computer-mediated communication can both depreciate as well as enhance how personal a communication is.
Social loafing: A meta-analytic review and theoretical integration
A robust meta-analysis of social loafing; the tendency for individuals to avoid putting effort into a task when working collectively over individually. Factors that moderate social loafing are also discussed.