2014
DOI: 10.1515/jhsem-2014-0035
|View full text |Cite
|
Sign up to set email alerts
|

From Weakest Link to Security Hero: Transforming Staff Security Behavior

Abstract: Practitioners, researchers and policy-makers involved with cyber security often talk about "security hygiene:" ways to encourage users of computer technology to use safe and secure behavior online. But how do we persuade workers to follow simple, fundamental processes to protect themselves and others? These issues are raised by behavioral scientists, to encourage worker, passenger and patient compliance. In this paper, we explore and summarize findings in social psychology about moral values and habit formatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 75 publications
(31 citation statements)
references
References 25 publications
0
31
0
Order By: Relevance
“…One possible approach is to bridge some of the shortcomings in some of the systems discussed above by developing more hybrid approaches that aim to remove the current security and usability shortcomings. Hence, we suggest a more user centric approach to security by providing a system that can effectively mitigate the security issues that relate to user behaviour, while still providing good usability [76,77,78]. The success of such systems will guarantee that organisations do not have to worry about what legitimate system users might do to jeopardize the security of their accounts or the entire system.…”
Section: Discussionmentioning
confidence: 99%
“…One possible approach is to bridge some of the shortcomings in some of the systems discussed above by developing more hybrid approaches that aim to remove the current security and usability shortcomings. Hence, we suggest a more user centric approach to security by providing a system that can effectively mitigate the security issues that relate to user behaviour, while still providing good usability [76,77,78]. The success of such systems will guarantee that organisations do not have to worry about what legitimate system users might do to jeopardize the security of their accounts or the entire system.…”
Section: Discussionmentioning
confidence: 99%
“…This means that most knowledgeable employees would probably consider all risks before implementing the change and be more cautious in their decisions. Finally, most security precautions require some investment of time—a valuable commodity in today's business world—and the additional steps required to meet security standards do not just require knowledge of the processes but also willingness to spend the time running those processes (Pfleeger, Sasse, & Furnham, ).…”
Section: Discussionmentioning
confidence: 99%
“…It is normally taken for granted that employees within the field of IT have to be highly trained and experienced in the technology and its tools. This experience would not be valid or useful unless those employees enjoy a high level of awareness regarding the importance of security, protection, and technological hazards that accompany IT-based organizations (Pfleeger, Sasse, & Furnham, 2014).…”
Section: Literature Reviewmentioning
confidence: 99%