End-User Computing
DOI: 10.4018/9781599049458.ch115
|View full text |Cite
|
Sign up to set email alerts
|

Computer Security and Risky Computing Practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
41
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(42 citation statements)
references
References 0 publications
1
41
0
Order By: Relevance
“…Research also found that people were willing to undertake risky practices. Individuals were actually rewarded as they were seen as helpful for allowing an event to take place without applying security controls or practice .…”
Section: Human Behaviourmentioning
confidence: 99%
“…Research also found that people were willing to undertake risky practices. Individuals were actually rewarded as they were seen as helpful for allowing an event to take place without applying security controls or practice .…”
Section: Human Behaviourmentioning
confidence: 99%
“…Researchers have recently noticed that technology alone is insufficient to ensure security and have started to pay attention to the human aspect of security (Anderson and Agarwal, 2006;Aytes and Terry, 2004;Ng et al, 2009;Woon et al, 2005;Workman et al, 2008). Yet, knowledge about user security behaviors is far from complete.…”
Section: Introductionmentioning
confidence: 99%
“…Facilitating conditions refers to the help and assistance that is available to users as they use their passwords. Facilitating conditions was measured using 6 items which are based on items from Aytes and Connolly (2004). Simple statements and a scenario involving a forgotten password were provided and the participants asked to rate their degree of agreement or disagreement using a 5 point Likert scale ranging from "strongly disagree" to "strongly agree".…”
Section: Facilitating Conditionsmentioning
confidence: 99%
“…Secure behavior intention relates to a participant's intention to use their passwords in a secure fashion. The items used to measure secure behavior intention are based on items from Aytes and Connolly (2004), Ng and Rahim (2005), and Brown et al (2002). Secure behavior intention was measured using 7 items relating to a scenario based around proper password hygiene.…”
Section: Secure Behavior Intentionmentioning
confidence: 99%
See 1 more Smart Citation