Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
The theory of planned behavior
Ajzen's theory of planned behaviour suggests attitudes towards a particular behavior, subjective norms and perceived behavioural control all shape an individual's behavioural intentions and behaviours. This study reviews literature concerning the theory and provides...
Security concerns of system users: A study of perceptions of the adequacy of security
In the past several years, a number of researchers have raised the issue of the level of security concern among system users, suggesting that security may be undervalued in both centralized and decentralized IS departments, and among IS staff as well as end-users....
Victims of fraud: Comparing victims of white collar and violent crime
This article compares the experiences of white collar and violent crime victims. It finds victims of white collar crime tend to be older, more affluent and relatively more likely to be female than victim crime; it finds generalised anxiety disorder and major...
The measurement and antecedents of affective, continuance and normative commitment to the organization
Researchers designed two studies to test three components of commitment to an organisation: affective commitment (ie, emotional attachment); continuance (ie, the costs of leaving); and normative (ie, feelings of obligation). They found affective and continuance...
On Defining Subjective and Objective Measurements
The adjectives "objective" and "subjective" frequently precede the noun "measurement," but all too often the terms are used without precision. Kerlinger has described objective measurements in terms of reliability. He states, "An objective procedure is one in which...
Perception of risk
This research investigates risk perception, focusing on how individuals assess and evaluate potential hazards and risky technologies. The aim is to support risk analysis and policy-making by offering insights into public reactions to hazards and enhancing risk...
Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation
This article reviews research on fear appeals before revising protection motivation theory based on the authors' literature review.
The need for cognition
This paper discusses four studies that allowed the authors to develop and validate a scale measuring an individual's ‘need for cognition’ (that is, an indivdual's tendency to engage in thinking and enjoy the practice of thinking things through). Notably, the studies...
Judgment under uncertainty: Heuristics and biases
People are often faced with making judgements base on what they believe will happen. This paper proposes said beliefs are largely born from heuristics, including representativeness, availability and anchoring.
The nominal group as a research instrument for exploratory health studies
This paper introduces a group process for conducting a preliminary investigation of a healthcare problem, encompassing both qualitative and quantitative elements, patterns, and overall structure. The authors provide reasons for using the nominal group process as a...
One more time: How do you motivate employees?
According to this paper, the only way to motivate the employee is to give him or her challenging work and the responsibility for its completion. As carrot and stick methods – such as financial incentives or disciplinaries – are examples of neither, they should be...
Habituation: A model phenomenon for the study of neuronal substrates of behaviour
This paper discusses habituation; the process of having a decrease in response to a stimulus that is repeatedly presented to an individual. Factors that influence habituation are discussed, as is the neurobiology associated with the concept.
Behavioral study of obedience
Social psychologist Stanley Milgram tests human obedience through an experiment which sees some participants instructed to inflict pain on fellow participants.
Organizational culture and leadership
Edgar H. Schein defines organizational culture & leadership, explains how the two are intertwined and offers advice on triggering cultural change, making his text relevant for those wishing to implement a cyber secure culture.