Proceedings 2014 Workshop on Usable Security 2014
DOI: 10.14722/usec.2014.23007
|View full text |Cite
|
Sign up to set email alerts
|

Learning from “Shadow Security:” Why Understanding Non-Compliant Behaviors Provides the Basis for Effective Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
93
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1

Relationship

5
3

Authors

Journals

citations
Cited by 75 publications
(94 citation statements)
references
References 27 publications
0
93
0
1
Order By: Relevance
“…In another systematic study of password use in the real world 5 , Sasse and her colleagues documented the ways in which workers at a large multinational organization side-stepped the official security requirements without (they hoped) being totally reckless. The employees' methods -writing down a list of passwords, for example, or transferring files between computers using unencrypted flash drives -would be familiar in most offices, but essentially created a system of 'shadow security' that kept the work flowing.…”
Section: Know Your Audiencementioning
confidence: 99%
“…In another systematic study of password use in the real world 5 , Sasse and her colleagues documented the ways in which workers at a large multinational organization side-stepped the official security requirements without (they hoped) being totally reckless. The employees' methods -writing down a list of passwords, for example, or transferring files between computers using unencrypted flash drives -would be familiar in most offices, but essentially created a system of 'shadow security' that kept the work flowing.…”
Section: Know Your Audiencementioning
confidence: 99%
“…An implicit assumption of this work has been that -if people are able to use a security mechanism correctly, they would be motivated to do so [4][5][6][7][8][9]. But work by usability researchers who listen closely to users [10], [11] and economics-inspired researchers looking at cost and benefits of security mechanisms [12], [13] suggests that the assumption that 'users want security, provided it's not too difficult to use' may be wide off the mark [11], [12], [14]. Users look for efficiencies in their daily lives, and that means 'the less I have to think about security, the better'.…”
Section: Current State Of Security Implementations In Organizationsmentioning
confidence: 99%
“…The traditional "command-and-control" approach to information security management treats employees as untrustworthy components, whose behavior has to be constrained [4]. But recent research has revealed that even employees who do not comply with some security policies are motivated and act responsible when they recognize a security risk, and the cost to them is reasonable [10], [11], [15].…”
Section: Current State Of Security Implementations In Organizationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Assertions about the effectiveness of password reset policies are then weakened if end-users feel pressured to respond to the burden in unanticipated ways. It may not be possible for those responsible for maintaining security to observe these unanticipated responses (or otherwise seem obvious for them to monitor behaviours if they have no evidence that policy is not being enacted) [3].…”
Section: Introductionmentioning
confidence: 99%