Nov 1, 2019 | Research
The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change. Benefiting from research in other fields, we...Nov 1, 2016 | Research
Security professionals lament the fact that users do not seem to see the need to take precautions or to behave securely. This frustrates them, since they themselves consider security to be very important, and they have to deal with the fallout when systems are...May 3, 2012 | Research
Information breaches demand a vigorous response from organizations. The traditional response is to institute policies to constrain and control employee behavior. Information security policies inform employees about appropriate uses of information technology in an...Dec 6, 2011 | Research
Information breaches demand a vigorous response from organizations. The traditional response is to institute policies to constrain and control employee behavior. Information security policies inform employees about appropriate uses of information technology in an...