The effects of psychological distance on abstraction: Two meta-analyses.
CK Soderberg, SP Callahan… - Psychological …, 2015 - psycnet.apa.org
Psychological distance and abstraction both represent key variables of considerable interest
to researchers across cognitive, social, and developmental psychology. Moreover, largely …
to researchers across cognitive, social, and developmental psychology. Moreover, largely …
Advanced social engineering attacks
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …
effective means to attack information systems. The services used by today's knowledge …
Social engineering attack examples, templates and scenarios
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …
security measures to protect sensitive information is increasing, people remain susceptible …
Understanding password choices: How frequently entered passwords are re-used across websites
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …
use. Yet, users do not always have good password security practices, leaving their accounts …
Individual differences in cyber security behaviors: an examination of who is sharing passwords
In spite of the number of public advice campaigns, researchers have found that individuals
still engage in risky password practices. There is a dearth of research available on individual …
still engage in risky password practices. There is a dearth of research available on individual …
Determinants of early conformance with information security policies
F Bélanger, S Collignon, K Enget… - Information & …, 2017 - Elsevier
Individuals often fail to perform the security behaviors their organizations request to protect
informational assets. However, forcing individuals into the compliance can trigger undesired …
informational assets. However, forcing individuals into the compliance can trigger undesired …
Why do they do what they do?: A study of what motivates users to (not) follow computer security advice
M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …
devices and data safe and how that compares to recommendations. Additionally, experts …
Bits under the mattress: Understanding different risk perceptions and security behaviors of crypto-asset users
S Abramova, A Voskobojnikov, K Beznosov… - Proceedings of the …, 2021 - dl.acm.org
Crypto-assets are unique in tying financial wealth to the secrecy of private keys. Prior
empirical work has attempted to study end-user security from both technical and …
empirical work has attempted to study end-user security from both technical and …
[HTML][HTML] Applying staged event-driven access control to combat ransomware
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …
Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia
S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …
acceptable in organizations, which demands extensive dependence on digital technologies …