Compliance with information security policies: An empirical investigation
M Siponen, S Pahnila, MA Mahmood - Computer, 2010 - ieeexplore.ieee.org
Information security was the main topic in this paper. An investigation of the compliance to
information security policies were discussed. The author mentions that the insignificant …
information security policies were discussed. The author mentions that the insignificant …
Influencing users towards better passwords: persuasive cued click-points
Usable security has unique usability challenges because the need for security often means
that standard human-computerinteraction approaches cannot be directly applied. An …
that standard human-computerinteraction approaches cannot be directly applied. An …
Toward a new meta-theory for designing information systems (IS) security training approaches
M Karjalainen, M Siponen - Journal of the Association for …, 2011 - aisel.aisnet.org
Employees' non-compliance with IS security procedures is a key concern for organizations.
To tackle this problem, there exist several training approaches aimed at changing …
To tackle this problem, there exist several training approaches aimed at changing …
Improving text passwords through persuasion
Password restriction policies and advice on creating secure passwords have limited effects
on password strength. Influencing users to create more secure passwords remains an open …
on password strength. Influencing users to create more secure passwords remains an open …
A design theory-based gamification approach for information security training
This study reviews previous information security (InfoSec) training studies and identifies
three significant gaps. They are (1) lacking pedagogical theories developed specifically in IS …
three significant gaps. They are (1) lacking pedagogical theories developed specifically in IS …
Improving passwords: Influence of emotions on security behaviour
I Gulenko - Information Management & Computer Security, 2014 - emerald.com
Purpose–This paper aims to study the influence of emotions on security behaviour by
reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature …
reviewing Information Systems Security (ISS) topics in Information Systems (IS) literature …
Persuasion for stronger passwords: Motivation and pilot study
Text passwords are the ubiquitous method of authentication, used by most people for most
online services. Many people choose weak passwords that are vulnerable to attackers who …
online services. Many people choose weak passwords that are vulnerable to attackers who …
[PDF][PDF] Usable authentication and click-based graphical passwords
S Chiasson - 2009 - repository.library.carleton.ca
" Humans are incapable of securely storing high-quality cryptographic keys, and they have
unacceptable speed and accuracy when performing cryptographic operations.(They are …
unacceptable speed and accuracy when performing cryptographic operations.(They are …
[PDF][PDF] A world with many authentication schemes
A Forget - 2013 - repository.library.carleton.ca
Usability and security challenges with standard text passwords have led researchers and
professionals to consider alternative authentication schemes. This thesis explores the …
professionals to consider alternative authentication schemes. This thesis explores the …
Persuasive technology for improving information security awareness and behavior: literature review
The use of Persuasive Technology in various fields is rapidly increasing. It can be applied in
many fields such as computing, marketing, sales, environment, education, and health …
many fields such as computing, marketing, sales, environment, education, and health …