Browsing by Subject "Behavioural threshold analysis"
Now showing items 1-4 of 4
-
The application of behavioural thresholds to analyse collective behaviour in information security
(Emerald, 2017)Purpose The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns. Design/methodology/approach Generic ... -
Behavioural threshold analysis in the context of information security
(North-West University (South Africa), 2021)The human aspect in information security provides a unique challenge for its assessment and management. Many studies seek to address this challenge by employing psychological models to understand the behaviour of individuals ... -
Behavioural threshold analysis: methodological and practical considerations for applications in information security
(Taylor & Francis, 2019)The application of behavioural threshold analysis to analyse group behaviour in information security presents a unique challenge in terms of the measurement instruments and methodology used to gather relevant attitude data. ... -
I shall, we shall, and all others will: paradoxical information security behaviour
(Emerald, 2018)Purpose – The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security. Design/methodology/approach – Behavioural threshold analysis is used to test ...