Learn More
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing(More)
Computer security issues have typically been approached from the perspective of building technical countermeasures to reduce risk. Recently, researchers have recognized that computer users play an important role in ensuring secure systems by implementing those technical countermeasures. As a means of encouraging safe computing practice, user training and(More)
Recent research in the treatment of sexual offenders suggests that comprehensive cognitive/behavioral approaches may yield lower recidivism. This study reviewed such a program, existing in Jackson County, Oregon, since 1982. Offenders were mandated into this community-based program upon conviction of a felony or misdemeanor sexual offense, and averaged 2-3(More)
Groups use procedural structures to organize their efforts in meetings. These structures are affected by group members' preferences for the degree of procedural order they want in a meeting, as well as by the communication media available in the meeting environment. Analysis of thirty partially distributed experimental groups that met over a series of four(More)