2018
DOI: 10.1016/j.cose.2018.01.016
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing security behaviour by supporting the user

Abstract: Although the role of users in maintaining security is regularly emphasized, this is often not matched by an accompanying level of support. Indeed, users are frequently given insufficient guidance to enable effective security choices and decisions, which can lead to perceived bad behaviour as a consequence. This paper discusses the forms of support that are possible, and seeks to investigate the effect of doing so in practice. Specifically, it presents findings from two experimental studies that investigate how… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(30 citation statements)
references
References 26 publications
0
30
0
Order By: Relevance
“…General Model: To propose a protection model, the following elements were taken from the references: the qualitative criteria of cyberattack were considered [24]; user behavior was considered for access control [29]; the criteria of levels of responsibility were adopted [37]; the application of security policies was considered [39]; [31] and the [36] use of phases for attack and response detection was considered.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…General Model: To propose a protection model, the following elements were taken from the references: the qualitative criteria of cyberattack were considered [24]; user behavior was considered for access control [29]; the criteria of levels of responsibility were adopted [37]; the application of security policies was considered [39]; [31] and the [36] use of phases for attack and response detection was considered.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
“…The authors studied the maintenance and accompaniment in user safety; the experiment on social networks was with 60 participants in 5 scenarios; the e-commerce experiment evaluated the generation of passwords to classify security elections; password security control is less than 0.01 units; the control in the times of the change of password is 0.11 units; suggestion control is 0.17 units [29].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to test the effect of guidance and feedback, a practical experiment was conducted in which a group of users were asked to perform a task involving password selection, but with differing levels of guidance and feedback to support them [16]. In order to ensure that the experiment was realistic, the participants were unaware that they were participating in a password-related study.…”
Section: Examining the Effect Of Guidance And Feedbackmentioning
confidence: 99%
“…Despite this, the information security community does not have a thorough understanding of what constitutes a human error and often resorts to general basic awareness or training on information security following an incident rather than dealing with the causal factors (Mahfuth et al, 2017). Current practices fall regularly short of identifying the actual root cause of human error related information security incidents even though people are recognized as being the weakest link in information security controls (Metalidou et al, 2014;Halevi et al, 2017;Mahfuth et al, 2017;Parsons et al, 2017;Furnell et al, 2018). There are also no established human error information security frameworks in practice to enable not only effective resolution of human error related information security incidents but also the prevention of these events.…”
Section: Introductionmentioning
confidence: 99%