//Research Library 

Our research library is the world’s first globally accessible archive of research into the human aspect of cyber security and behavioural science as applied to cyber security awareness and online behavioural change.

To see the latest studies from pioneering academics, scroll down.

 

 

Filter your results:

2017
Nov, 2017

Securing Mobile Devices: Evaluating the Relationship between Risk Perception, Organisational Commitment and Information Security Awareness

This study examined the relationship between perception of risk, organisational commitment, and Information Security Awareness (ISA), finding both organisational commitment and perception of personal risk to be significant predictors of ISA. Surprisingly, frequency of workplace information security training negatively affected ISA.

 

Read full paper

 

 

Authors: A. Reeves, K. Parsons and D. Calic

Nov, 2017

Deep Thought: A Cybersecurity Story

ideas42 aims to help solve difficult social problems using insights from behavioural science. In this instance, the problem in question is the human aspect of cyber security. The paper applies psychology and behavioural science principles to common cyber security issues such as phishing, unsecure public Wi-Fi and poor passwords.

 

 

Read full paper

 

 

Authors: Alex Blau, Alexandra Alhadeff, Michael Stern, Scott Stinson, Josh Wright, ideas42

Nov, 2017

Embedding Security Behaviours: using the 5Es

This framework is designed to help embed and sustain security behaviours in employees. The framework is condensed into 5Es (Educate, Enable, Environment, Encourage, Evaluate) and explains how to implement these using examples and tactical interventions.

 

Read full paper

 

 

Authors: CPNI

Oct, 2017

How to Launch a Behavior-Change Revolution

A team spear-headed by University of Pennsylvania researchers have launched an ambitious research project called Behavior Change for Good. The project will attempt to determine the best behavioural-change practices in three areas: health, education and personal finance. It will test many ideas with the ultimate aim of uncovering how best to change human behaviour.

 

Read full paper

 

 

Authors: Steven D Levitt & Steven J Dubner

Oct, 2017

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

This paper proposes and sets out the framework for the development of a game designed to help educate users about phishing attacks. The proposed game draws on academic research and would take the form a series of challenges that inherently educate users about phishing concepts.

 

Read full paper

 

 

Authors: Gaurav Misra, N.A.G. Arachchilage and Shlomo Berkovsky

Oct, 2017

If someone is watching, I’ll do what I’m asked: mandatoriness, control, and information security

This research finds people are motivated to follow security procedures when they believe the procedures to be compulsory, and that both specifying policies and evaluating behaviors help position security policies as mandatory. It follows that specifying policies and evaluating behaviours is more likely to lead to security procedures being followed.

 

Read full paper

 

 

Authors: Scott R Boss, Laurie J Kirsch, Ingo Angermeier, Raymond A Shingler, R Wayne Boss

Aug, 2017

Cybersecurity regained: preparing to face cyber attacks

Packed with statistics and survey results, this paper profiles the ever-growing cyber threat landscape and offers advice to help address and overcome risks.

 

Read full paper

 

 

Authors: EY

Jul, 2017

Cultivating a Cyber Risk Aware Culture

This paper offers an insight into what’s needed for an organisation to achieve a cyber risk aware culture and outlines the importance of establishing such a culture.

 

Read full paper

 

 

Authors: Deloitte

Jul, 2017

Individual differences in susceptibility to online influence: A theoretical review

This paper reviews academic literature on the both individual differences and contextual factors that influence susceptibility to cyber attacks, including self-awareness, self-control, security expertise, motivation, trust and attitudes to risk.

 

Read full paper

 

 

Authors: Emma J.Williams, AmyBeardmore, Adam N.Joinsona

May, 2017

The Human Factor in Cybercrime and Cybersecurity

A Research Agenda publication aiming to stimulate research on the human factor in cyber crime and cyber security. This book offers examples of unanswered research questions and methods and datasets that could be used for future studies.

 

Read full paper

 

 

Authors: Mark Evans, Leandros A. Maglaras, Ying He, Helge Janicke

Want to suggest an addition to our research library?

Suggest