An Extended Perspective on Individual Security Behaviors

Security threats regularly affect users of home computers. As such, it is important to understand the practices of users for protecting their computers and networks, and to identify determinants of these practices. Several recent studies utilize Protection Motivation...

Scam Compliance and the Psychology of Persuasion

This paper finds four reliable factors contribute to susceptibility to persuasion: influence of authority, social influence, self-control and the need for consistency. The paper finds all four inform susceptibility to scam compliance.   Read full paper  ...

A Study of Social Engineering in Online Frauds

Researchers analyse 200 scam emails in search of patterns, and find alert and account verification, urgency, potential monetary gain, business proposals and mentions of large, unclaimed funds are repeatedly used in scam emails.   Read full paper    ...

On The Security of Password Manager Database Formats

Findings from this paper show that most password managers are easily broken and use storage formats that are easily accessible, even to weak adversaries. The work does, however, show that it is possible to theoretically construct a format that is secure, that’s usable...

The psychology of security for the home computer user

The home computer user is often said to be the weakest link in computer security. They do not always follow security advice, and they take actions, as in phishing, that compromise themselves. In general, we do not understand why users do not always behave safely,...

European Online Grooming Project: Final Report

A report on the findings of an ambitious project aiming to understand the behaviours involved in online grooming across Europe. The report concludes groomers’ behaviours vary wildly and that, by facilitating anonymity, technology helps groomers justify their...

Text, lies and electronic bait: An analysis of email fraud

What is it that makes people fall for email scams? This analysis concluded that scammers are most concerned about building solidarity with their victims and playing to a mark’s egocentrism, which both ultimately prevent victims from making well-informed decisions....

Scare tactics – A viable weapon in the security war?

End users are frequently criticised as the sources of bad security practice, and it is suggested they might take the issue more seriously if they experienced a breach. An option for enabling this would be for security administrators to deliberately create conditions...

Self-disclosure, Privacy and the Internet

Authors discuss literature relating to self-disclosure on the internet, with a particular focus on disclosure via computer mediated communication and web-based forms. The authors posit further research questions.   Read full paper     Authors: Adam N....

Fraud typologies and victims of fraud: literature review

This comprehensive review seeks to report on fraud in a wide variety of forms, with a particular focus on mass marketing, identity and small business fraud. It finds fraud is often innovative, comes in a wide variety of forms and that fraudsters use a combination of...