Dispositional and situational factors: influences on information security policy violations

AC Johnston, M Warkentin, M McBride… - European Journal of …, 2016 - Taylor & Francis
Insiders represent a major threat to the security of an organization's information resources.
Previous research has explored the role of dispositional and situational factors in promoting …

Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …

Problematic use of social networking sites: Antecedents and consequence from a dual-system theory perspective

O Turel, H Qahri-Saremi - Journal of Management Information …, 2016 - Taylor & Francis
Problematic use of social networking sites (SNS) and its adverse consequences have
become prevalent, yet little is known about the conceptualization and etiology of problematic …

The security of modern password expiration: An algorithmic framework and empirical analysis

Y Zhang, F Monrose, MK Reiter - … of the 17th ACM conference on …, 2010 - dl.acm.org
This paper presents the first large-scale study of the success of password expiration in
meeting its intended purpose, namely revoking access to an account by an attacker who has …

Toward a theory of information systems security behaviors of organizational employees: A dialectical process perspective

M Karjalainen, S Sarker… - Information Systems …, 2019 - pubsonline.informs.org
The various guidelines, procedures, and policies referred to as information systems security
procedures (ISSPs) underlie information systems security behaviors (ISSBs) of many …

Can individuals' neutralization techniques be overcome? A field experiment on password policy

M Siponen, P Puhakainen, A Vance - Computers & Security, 2020 - Elsevier
Individuals' lack of adherence to password security policy is a persistent problem for
organizations. This problem is especially worrisome because passwords remain the primary …

Towards reliable storage of 56-bit secrets in human memory

J Bonneau, S Schechter - 23rd USENIX Security Symposium (USENIX …, 2014 - usenix.org
Challenging the conventional wisdom that users cannot remember cryptographically-strong
secrets, we test the hypothesis that users can learn randomly-assigned 56-bit codes …

Influence of awareness and training on cyber security

KF McCrohan, K Engel, JW Harvey - Journal of internet Commerce, 2010 - Taylor & Francis
This article presents the results of a study to determine the impact of a cyber threat education
and awareness intervention on changes in user security behavior. Subjects were randomly …

The quest for complete security: An empirical analysis of users' multi-layered protection from security threats

RE Crossler, F Bélanger, D Ormond - Information Systems Frontiers, 2019 - Springer
Individuals can perform many different behaviors to protect themselves from computer
security threats. Research, however, generally explores computer security behaviors in …

Improving password memorability, while not inconveniencing the user

N Woods, M Siponen - International Journal of Human-Computer Studies, 2019 - Elsevier
Passwords are the most frequently used authentication mechanism. However, due to
increased password numbers, there has been an increase in insecure password behaviors …