2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 2018
DOI: 10.1109/compsac.2018.10323
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of the Effectiveness of Risk Assessment and Security Fatigue Visualization Model for Internal E-Crime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…This cost often results in what security experts might consider less secure online behaviour. Hatashima et al (2018) describe fatigue as a human experience when faced with multiple external actions to mitigate security risk.…”
Section: Security Complexity and Fatiguementioning
confidence: 99%
See 2 more Smart Citations
“…This cost often results in what security experts might consider less secure online behaviour. Hatashima et al (2018) describe fatigue as a human experience when faced with multiple external actions to mitigate security risk.…”
Section: Security Complexity and Fatiguementioning
confidence: 99%
“…If countermeasures are implemented to reduce employees’ risky behaviours, this can lead to a vicious circle: security policies and procedures → employee fatigue → risky behaviour is displayed → additional policies and procedures, etc. (Hatashima et al , 2018). In the context of risk, Wilde (1982, 1998) proposed a homeostatic mechanism which predicts that individuals will weigh the expected benefits of risky behaviour against the costs and determine the level of risk they are willing to accept.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In Fig. 2, the results of latent rank theory analysis based on a questionnaire survey show that the ideal group is the F2-Im2 group, which had a high degree of security measure implementation (value on the horizontal axis: Im2) and a moderately strained state of information security fatigue (value on the vertical axis: F2) [3]- [4].…”
Section: Information Security Condition Matrix: Establishment Of Information Security Fatigue Measurement Scalementioning
confidence: 99%
“…If countermeasures are implemented to reduce employees' risky behaviours this can lead to a vicious circle: security policies and procedures → employee fatigue → risky behaviour is displayed → additional policies and procedures, etc. [10]. Wilde [18] suggests employees will weigh the expected benefits of risky behaviour against the costs and determine the level of risk they are willing to accept.…”
Section: Introductionmentioning
confidence: 99%