Jan 7, 2013 | Research
Passwords remain the dominant authentication mechanism for information security. Unfortunately, research has shown that most passwords are highly insecure. Given the risks of using weak passwords, there is a need to effectively motivate users to select strong...Jun 5, 2012 | Research
This paper proposes future research to be conducted which aims to understand the motivations of individual perpetrators who violate organisations’ security and the link between security intentions and behaviour.Sep 17, 2008 | Research
Organizations and individuals are increasingly impacted by misuses of information that result from security lapses. Most of the cumulative research on information security has investigated the technical side of this critical issue, but securing organizational systems...Jan 15, 1991 | Research
In the past several years, a number of researchers have raised the issue of the level of security concern among system users, suggesting that security may be undervalued in both centralized and decentralized IS departments, and among IS staff as well as end-users....