Jul 8, 2015 | Research
In this paper, a role play scenario experiment of people’s ability to differentiate between phishing and genuine emails demonstrated limitations in the generalisability of phishing studies. This involves issues around the priming of participants and the...Oct 8, 2014 | Research
The purpose of this paper is to investigate the human-based information security (InfoSec) vulnerabilities in three Australian government organisations. A Web-based survey was developed to test attitudes, knowledge and behaviour across eight policy-based focus areas....May 8, 2014 | Research
The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour. Past and current efforts to improve information-security practices and...Mar 9, 2012 | Research
The purpose of this paper is to investigate the behaviour response of computer users when either phishing e‐mails or genuine e‐mails arrive in their inbox. The paper describes how this research was conducted and presents and discusses the findings. This study was a...Jan 9, 2010 | Research
This paper proposes a research method that investigates the risk perceptions of computer endusers relating to organisational Information Security (InfoSec) and the situational factors that influence these perceptions. This method uses the Repertory Grid Technique...