Human Behaviour as an aspect of Cyber Security Assurance

This paper considers existing research into cyber security assurance processes in an effort to identify elements of cyber security that would benefit from further research and development. It concludes the cyber security industry would benefit from more research into...

The psychology of security for the home computer user

The home computer user is often said to be the weakest link in computer security. They do not always follow security advice, and they take actions, as in phishing, that compromise themselves. In general, we do not understand why users do not always behave safely,...

The Current State of Phishing Attacks

This article discusses phishing attacks. It introduces the anatomy of a phishing attack, considers why people fall for phishing attacks and estimates the damage of phishing attacks. The article also discusses common tecniques for preventing phishing.   Read full...

Self-disclosure, Privacy and the Internet

Authors discuss literature relating to self-disclosure on the internet, with a particular focus on disclosure via computer mediated communication and web-based forms. The authors posit further research questions.   Read full paper     Authors: Adam N....

Fraud typologies and victims of fraud: literature review

This comprehensive review seeks to report on fraud in a wide variety of forms, with a particular focus on mass marketing, identity and small business fraud. It finds fraud is often innovative, comes in a wide variety of forms and that fraudsters use a combination of...

Promoting Personal Responsibility for Internet Safety

A framework to motivate safe online behavior that interprets prior research and uses it to evaluate some of the nonprofit online safety education efforts is presented. Self-efficacy and response efficacy have the most consistent impact on safety behavior, and also...

Accuracy of Deception Judgments

The authors review literature on deception studies and conclude people can correctly identify a lie (or a truth) 54% of the time. Authors also conclude that people are more accurate in judging audible than visible lies, that people appear deceptive when motivated to...

On-line trust: concepts, evolving themes, a model

Following a discussion of relevant literature, researchers propose a model of online trust between users and websites. The model includes three factors that affect online trust: perception of credibility, ease of use and risk.   Read full paper    ...

Gender Differences in Risk Taking: A Meta-Analysis

The researchers review 150 studies on the difference in risk-taking behaviour between males and females, concluding that males are typically more risk-seeking than females but that the gap appears to be shrinking over time.   Read full paper    ...

The theory of planned behavior

Ajzen’s theory of planned behaviour suggests attitudes towards a particular behavior, subjective norms and perceived behavioural control all shape an individual’s behavioural intentions and behaviours. This study reviews literature concerning the theory...