2012
DOI: 10.1016/j.cose.2011.12.010
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging behavioral science to mitigate cyber security risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
138
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 196 publications
(138 citation statements)
references
References 21 publications
0
138
0
Order By: Relevance
“…Although this impact is clearly computable when it only concerns a limited control over a technological system (e.g., hiding some attributes in an access control system), it is not necessarily the case in general. Research in psychology tells us that decision-makers can be influenced (e.g., [11,23,10,5]), and there is a growing interest in using behavioural sciences when developing and implementing security products revealed recently (e.g., [15,20,24,18,6]). However, more research is needed to eventually provide a catalog of effects applicable to a decision-maker, together with a measure of their impact.…”
Section: Resultsmentioning
confidence: 99%
“…Although this impact is clearly computable when it only concerns a limited control over a technological system (e.g., hiding some attributes in an access control system), it is not necessarily the case in general. Research in psychology tells us that decision-makers can be influenced (e.g., [11,23,10,5]), and there is a growing interest in using behavioural sciences when developing and implementing security products revealed recently (e.g., [15,20,24,18,6]). However, more research is needed to eventually provide a catalog of effects applicable to a decision-maker, together with a measure of their impact.…”
Section: Resultsmentioning
confidence: 99%
“…Users are not equipped with the right mental models to understand how their actions impact their privacy. Privacy self-management is also not considered to be their primary task (Pfleeger and Caputo, 2012). However, an important part of the app store experience requires users to consent to a certain level of data access that may involve detrimental consequences like identity theft.…”
Section: Introductionmentioning
confidence: 97%
“…Poor security communication makes it difficult for users to respond to a real security threat since they may underestimate the likelihood of the threat. Often users are motivated to respond to a security threat when the risk is evident and personal (Pfleeger & Caputo, 2011). Furthermore, little is known about the circumstances in which individuals feel fearful and the characteristics of the individuals that may serve to accentuate or diminish the emotion of fear in security compliance situations (Crossler et al, 2013).…”
Section: Severity and Vulnerability Of Security Threatsmentioning
confidence: 99%
“…Furnell and Rajendran (2012) identified a mix of job characteristics, and organisational and non-work factors that all play a role in affecting employees' security compliance. To complicate the issue fur-ther, individuals' personality attributes can also act as a filter of the environmental impact and affect individual attitudes and behaviour toward security behaviour (Furnell Rajendran, 2012;Pfleeger & Caputo, 2011).…”
Section: Research Challenges For Improving Security Behaviourmentioning
confidence: 99%