2017 5th Intl Conf on Applied Computing and Information Technology/4th Intl Conf on Computational Science/Intelligence and Appl 2017
DOI: 10.1109/acit-csii-bcd.2017.30
|View full text |Cite
|
Sign up to set email alerts
|

A Concept Proposal on Modeling of Security Fatigue Level

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…The continuous influx of defensive countermeasures is called out as a stressor that results in security fatigue and burnout syndrome (Tanimoto et al, 2017). For example, research conducted by Tanimoto et al (2017) in Figure 1, attribution analysis (a) highlights frequent human-induced errors that are categorized in three categories (technical, environmental, and artificial), in which artificial factors illustrates unintended outcomes, such as unintentional human mistakes or errors.…”
Section: Training Fatiguementioning
confidence: 99%
See 1 more Smart Citation
“…The continuous influx of defensive countermeasures is called out as a stressor that results in security fatigue and burnout syndrome (Tanimoto et al, 2017). For example, research conducted by Tanimoto et al (2017) in Figure 1, attribution analysis (a) highlights frequent human-induced errors that are categorized in three categories (technical, environmental, and artificial), in which artificial factors illustrates unintended outcomes, such as unintentional human mistakes or errors.…”
Section: Training Fatiguementioning
confidence: 99%
“…The continuous influx of defensive countermeasures is called out as a stressor that results in security fatigue and burnout syndrome (Tanimoto et al, 2017). For example, research conducted by Tanimoto et al (2017) in Figure 1, attribution analysis (a) highlights frequent human-induced errors that are categorized in three categories (technical, environmental, and artificial), in which artificial factors illustrates unintended outcomes, such as unintentional human mistakes or errors. Strict security countermeasures or policies could inadvertently incite unintentional mistakes, as illustrated below to what researchers call a vicious cycle resulting in tightening security policies and rules, accompanied by human-induced errors (Tanimoto et al, 2017).…”
Section: Training Fatiguementioning
confidence: 99%
“…One of the lead causes of security fatigue is the need for strict compliance with security policies of the organizations [8,9]. Some of the examples include encryption, automatic updates, and adhering to access-control policies [10].…”
Section: Motivation: the Role Of Human Errors And Security Fatiguementioning
confidence: 99%
“…Additionally, unsafe behaviors caused by security fatigue are exacerbated by an individual's perceived level of risk and risk-avoidance [11]. While researchers have tried to measure and model security fatigue [7,9], the mitigation of security fatigue is even more challenging.…”
Section: Motivation: the Role Of Human Errors And Security Fatiguementioning
confidence: 99%
“…Employees typically recognize that the rules are necessary to protect security and they follow them, even if their operational efficiency is slightly reduced, but as time passes, the organization gradually falls into a vicious cycle in which the rules are no longer followed, as shown in Fig. 1 [16]. This situation in which the information security policy is not properly adhered to is one of the main reasons information security policies are not properly operated.…”
Section: Vicious Cycle Due To Strict Security Operationsmentioning
confidence: 99%