Learn More
Despite rapid technological advances in computer hardware and software, insecure behavior by individual computer users continues to be a significant source of direct cost and productivity loss. Why do individuals, many of whom are aware of the possible grave consequences of low-level insecure behaviors such as failure to backup work and disclosing(More)
Computer security issues have typically been approached from the perspective of building technical countermeasures to reduce risk. Recently, researchers have recognized that computer users play an important role in ensuring secure systems by implementing those technical countermeasures. As a means of encouraging safe computing practice, user training and(More)
Recent research in the treatment of sexual offenders suggests that comprehensive cognitive/behavioral approaches may yield lower recidivism. This study reviewed such a program, existing in Jackson County, Oregon, since 1982. Offenders were mandated into this community-based program upon conviction of a felony or misdemeanor sexual offense, and averaged 2-3(More)
  • Kregg Aytes
  • 1995
Collaborative drawing tools, which are designed to allow multiple users to share an electronic drawing space, have recently become the focus of many researchers' efforts. While advances have been made in the technological implementation of these tools, little is known about the effect these tools have on group processes. This paper discusses a study that(More)
Despite the availability of numerous methods and publications concerning the proper conduct of information security risk analyses, small and medium sized enterprises (SMEs) face serious organizational challenges managing the deployment and use of these tools and methods to assist them in selecting and implementing security safeguards to prevent IS security(More)
Groups use procedural structures to organize their efforts in meetings. These structures are affected by group members' preferences for the degree of procedural order they want in a meeting, as well as by the communication media available in the meeting environment. Analysis of thirty partially distributed experimental groups that met over a series of four(More)