User Risky Behavior and Security Awareness through Lifespan

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Phishing for user security awareness

User security education and training is one of the most important aspects of an organizations security posture. Using security exercises to reinforce this aspect is frequently done by education and industry alike; however these exercises usually enlist willing participants. We have taken the concept of using an exercise and modified it in application to evaluate a users propensity to respond to...

متن کامل

Security, Potential, Goal Achievement, and Risky Choice Behavior

This paper develops a new model for risky choice behavior—Target Utility Theory (TUT)—that shed light on several puzzles of the decision making and financial literatures. In particular, TUT can explain the experimental evidence related to goal seeking behavior (Payne et al., 1980), preference for security/potential (Levy and Levy, 2002), and the effect of prior outcomes on risky choice behavior...

متن کامل

User Awareness Measurement Through Social Engineering

TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of “Information Security Tests” [19]. This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies. The tests include phone calling to sa...

متن کامل

Mitigating Information Security Risks by Increasing User Security Awareness: A Case Study of an Information Security Awareness System

Organizations that lack security awareness can miss detecting many obvious security risks such as Trojans, phishing, viruses, and intellectual property theft in their daily activities. This lack of awareness can render sophisticated Internet security technologies useless and expose the organization to enormous risks. This paper adopts the systems development research methodology to investigate ...

متن کامل

User Modelling Validation over the Security Awareness of Digital Natives

Young generations make extensive use of mobile devices, such as smart-phones, tablets and laptops, for a variety of daily tasks with potentially critical impact, while the number of security breaches via portable devices increases exponentially. A plethora of security risks associated with these devices are induced by design shortcomings and vulnerabilities related to user behavior. Therefore, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of electrical and computer engineering systems

سال: 2019

ISSN: 1847-7003,1847-6996

DOI: 10.32985/ijeces.9.2.2