235 research outputs found

    Herd Behaviour in Cryptocurrency Markets

    Get PDF
    Cryptocurrency markets are highly volatile, with significant and sudden price shifts often influenced by investor sentiment. We demonstrate the significant role of herd behaviour in influencing positive attitudes and subsequent behaviour in cryptocurrency purchasing. Through a survey of 130 active cryptocurrency investors, we empirically examine the factors which influence attitudes and behaviours. Our results indicate that perceived behavioural control, social norms, and propensity to imitate others, a dimension of herd behaviour, strongly influence attitudes towards cryptocurrency behaviour and subsequent behaviours. These findings provide new insights into some of the psychological factors involved in the decision to invest in cryptocurrency and help to understand the unpredictable cryptocurrency market environment

    Teaching case: Analysis of an electronic voting system

    Get PDF
    This teaching case discusses the analysis of an electronic voting system. The development of the case was motivated by research into information security and management, but as it includes procedural aspects, organizational structure and personnel, it is a suitable basis for all aspects of systems analysis, planning and design tasks. The material is based on real life analysis of currently used electronic voting systems, which have been generalized so as to highlight the wider issues and to not identify with any particular implementation of electronic voting. Suggested project deliverables are described in the teaching case, and these are complemented by the associated teaching notes which detail sample solutions and discussion points for class

    Mining the Mind – Applying Quantitative Techniques to Understand Mental Models of Security

    Get PDF
    The personal information shared on Facebook can expose individuals to increased risk such as cybercrime and identity theft. While the perception of risk associated with online self-disclosure is increasing, this may not translate into risk management behaviours. This study explored why individuals choose to self-disclose on Facebook, often in spite of the risks. It was hypothesised that a personality style accentuated by impulsive and anti-social behaviour would help to explain this risk-behaviour dichotomy. In other words, individuals who are more narcissistic with less self-control were predicted to expose themselves to more risk on Facebook. An online questionnaire was completed by 263 Australians. This study found that individuals who had less self-control and higher narcissism exposed themselves to significantly more risk on Facebook. Hence, this study found that narcissism and self-control play a meaningful role in the risk-behaviour dichotomy. These findings add to the body of literature on online self-disclosure

    A unified classification model to insider threats to information security

    Get PDF
    Prior work on insider threat classification has adopted a range of definitions, constructs, and terminology, making it challenging to compare studies. We address this issue by introducing a unified insider threat classification model built through a comprehensive and systematic review of prior work. An insider threat can be challenging to predict, as insiders may utilise motivation, creativity, and ingenuity. Understanding the different types of threats to information security (and cybersecurity) is crucial as it helps organisations develop the right preventive strategies. This paper presents a thematic analysis of the literature on the types of insider threats to cybersecurity to provide cohesive definitions and consistent terminology of insider threats. We demonstrate that the insider threat exists on a continuum of accidental, negligent, mischievous, and malicious behaviour. The proposed insider threat classification can help organisations to identify, implement, and contribute towards improving their cybersecurity strategies

    Gender Differences in Information Security Perceptions and Behaviour

    Get PDF
    Information security is of universal concern to computer users from all walks of life. Though gender differences in technology adoption are well researched, scant attention has been devoted to the study of gender differences in information security. We address this research gap by investigating how information security perceptions and behaviours vary between genders in a study involving 624 home users. The results reveal that females exhibit significantly lower overall levels of security behaviour than males. Furthermore, individual perceptions and behaviours in many cases also vary by gender. Our work provides evidence that gender effects should be considered when formulating information security education, training, and awareness initiatives. It also provides a foundation for future work to explore information security gender differences more deeply

    Analysis of an Electronic Voting System

    Get PDF
    This teaching case discusses the analysis of an electronic voting system. The development of the case was motivated by research into information security and management, but as it includes procedural aspects, organizational structure and personnel, it is a suitable basis for all aspects of systems analysis, planning and design tasks. The material is based on real life analysis of currently used electronic voting systems, which have been generalized so as to highlight the wider issues and to not identify with any particular implementation of electronic voting. Suggested project deliverables are described in the teaching case, and these are complemented by the associated teaching notes which detail sample solutions and discussion points for class

    Education Cybersecurity Assessment Tool: A cybersecurity self-assessment tool for the Australian K-12 sector

    Get PDF
    The K-12 education sector is a unique sector that continues to be the target of cyber security threats. A growing misconception is that large organisations are the main target of hackers; however, the attack surface of K-12 schools is often greater than large organisations and small, medium enterprises (SME), given the numbers of students. Schools are tasked with protecting against cyber threats; however, existing frameworks are often complex and inappropriate for the education sector. This paper presents a novel cybersecurity self-assessment tool for Australian K-12 schools to assess their compliance with the National Institute of Standards and Technology – Cybersecurity Framework (NIST CSF

    Public Acceptance of Internet Censorship in Indonesia

    Get PDF
    The rapid uptake of digital technologies promises great benefits for citizens to transact and communicate in a free and open space. Yet this freedom may also lead governments to impose regulation and to attempt to filter content that may be considered offensive or politicised in nature. We empirically study public perceptions of internet censorship, perceived personal consequences of internet filtering and the use of tools to circumvent censorship through a survey of 112 residents of Indonesia, analysing our results with PLS structural equation modelling. Our findings show that perceived need for filtering, as well as social norms strongly influence public attitudes. We also find that uncertainty avoidance – a cultural trait - also influences these attitudes. However, the use of circumvention tools is determined by perceived personal consequences rather than attitude. Our findings address the lack of research in this space while addressing implications for government and policymakers

    Cultural Factors and the Role of Privacy Concerns in Acceptance of Government Surveillance

    Get PDF
    Though there is a tension between citizens’ privacy concerns and their acceptance of government surveillance, there is little systematic research in this space, and less still in a cross cultural context. We address the research gap by modeling the factors that drive public acceptance of government surveillance, and by exploring the influence of national culture. The research involved an online survey of 242 Australian and Sri Lankan residents. Data was analyzed using PLS, revealing that privacy concerns around initial collection of citizens’ data influenced levels of acceptance of surveillance in Australia but not Sri Lanka, whereas concerns about secondary use of data did not influence levels of acceptance in either country. These findings suggest that respondents conflate surveillance with the collection of data and may not consider subsequent secondary use. We also investigate cultural differences, finding that societal collectivism and power distance significantly affect the strength of the relationships between privacy concerns and acceptance of surveillance, on the one hand, and adoption of privacy protections, on the other. Our research also considers the role of trust in government, and perceived need for surveillance. Findings are discussed with their implications for theory and practice

    Privacy Concerns and Acceptance of Government Surveillance in Australia

    Get PDF
    Increases in routine data collection and surveillance in recent years have resulted in ongoing tension between citizens’ privacy concerns, perceived need for government surveillance and acceptance of policies. We address the lack of Australia focussed research through an online survey of 100 Australian residents. Data was analysed using PLS, revealing that privacy concerns around collection influence acceptance of surveillance but do not influence enactment of privacy protections. Conversely, respondents’ concerns about secondary use of data were unrelated to their levels of acceptance, yet were a significant determinant of privacy protections. These findings suggest that respondents conflate surveillance with collection of data, and may not consider subsequent secondary use. This highlights the multi-dimensional nature of privacy which must be studied at sufficiently granular level to draw meaningful conclusions. Our research also considers the role of trust in government, and perceived need for surveillance and these findings are discussed with their implications
    • …
    corecore