This paper discusses four studies that allowed the authors to develop and validate a scale measuring an individual's ‘need for cognition’ (that is, an indivdual's tendency to engage in thinking and enjoy the practice of thinking things through). Notably, the studies...
Research Library
The world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.
To see the latest studies from pioneering academics, scroll down.
Judgment under uncertainty: Heuristics and biases
People are often faced with making judgements base on what they believe will happen. This paper proposes said beliefs are largely born from heuristics, including representativeness, availability and anchoring.
The nominal group as a research instrument for exploratory health studies
This paper presents a group process for conducting an exploration of the qualitative and quantitative elements, patterns and total structure of a health care problem under preliminary investigation. Reasons for employing the nominal group process as a pilot research...
One more time: How do you motivate employees?
According to this paper, the only way to motivate the employee is to give him or her challenging work and the responsibility for its completion. As carrot and stick methods – such as financial incentives or disciplinaries – are examples of neither, they should be...
Habituation: A model phenomenon for the study of neuronal substrates of behaviour
This paper discusses habituation; the process of having a decrease in response to a stimulus that is repeatedly presented to an individual. Factors that influence habituation are discussed, as is the neurobiology associated with the concept.
Behavioral study of obedience
Social psychologist Stanley Milgram tests human obedience through an experiment which sees some participants instructed to inflict pain on fellow participants.
Organizational culture and leadership
Edgar H. Schein defines organizational culture & leadership, explains how the two are intertwined and offers advice on triggering cultural change, making his text relevant for those wishing to implement a cyber secure culture.