Sciweavers

17 search results - page 2 / 4
» Behavioral response to phishing risk
Sort
View
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 9 hour ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 7 days ago
A Simple Model for the Reliability of an Infrastructure System Controlled by Agents
A simple dynamic model of agent operation of an infrastructure system is presented. This system evolves over a long time scale by a daily increase in consumer demand that raises t...
Benjamin A. Carreras, David E. Newman, Ian Dobson,...
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
13 years 10 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
ISSA
2008
13 years 6 months ago
Password Management: Empirical Results from a RSA and USA Study
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
ACSAC
2009
IEEE
14 years 8 days ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...