Proceedings of the 2011 New Security Paradigms Workshop 2011
DOI: 10.1145/2073276.2073279
|View full text |Cite
|
Sign up to set email alerts
|

Reducing normative conflicts in information security

Abstract: Security weaknesses often stem from users trying to comply with social expectations rather than following security procedures. Such normative conflicts between security policies and social norms are therefore undesirable from a security perspective. It has been argued that system developers have a "meta-task responsibility", meaning that they have a moral obligation to enable the users of the system they design to cope adequately with their responsibilities. Depending on the situation, this could mean forcing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…This will include implementation of intrusion detection techniques that build on our results in [31,32]. We are also interested in exploring the role of social and behavioral norms in human-computer interaction, however, we would agree with [33] that using qualitative research methods to discover norms in social behavior is an onerous undertaking, therefore requires resource allocation for something that may appear intangible and difficult to justify in the short-term.…”
Section: Resultsmentioning
confidence: 96%
See 2 more Smart Citations
“…This will include implementation of intrusion detection techniques that build on our results in [31,32]. We are also interested in exploring the role of social and behavioral norms in human-computer interaction, however, we would agree with [33] that using qualitative research methods to discover norms in social behavior is an onerous undertaking, therefore requires resource allocation for something that may appear intangible and difficult to justify in the short-term.…”
Section: Resultsmentioning
confidence: 96%
“…This also reflects an often overlooked part of security which is that users are part of the system, exercising their own judgment and following informal and unexpected processes [44]. Note that social norms can also underpin behavior that is at odds with security policies [33]. Of course, a challenge with social norms is that they can be difficult to recognize and understand.…”
Section: Norms and Social Ordermentioning
confidence: 99%
See 1 more Smart Citation
“…Normatives are fundamental for prioritizing goals, organizing and planning actions in order to define how things should be done. Considering the user's perspective, it is much more common than it may seem, but users generally try to follow social expectations rather than following security procedures [ 29 ]. This is not desirable regarding security perspectives, because such conflicts lead to security policy inconsistency.…”
Section: Tisa: Trust Information Security Architecturementioning
confidence: 99%
“…Understanding risk management in critical infrastructures is a multifaceted issue of both qualitative and quantitative nature (Shreeve et al 2020). Despite the rise of rule-based and probabilistic risk methodologies, for example, attack trees, attribute-based algorithms (Tatam et al, 2021), security risk is ‘incalculable’ since there are limits of what could be inferred from scientific data (Amoore, 2014: 424). Risk methodologies are ‘already political’ as they involve combinatorial possibilities whose arrangement has effects on risk scores, and associated countermeasures (Amoore, 2014: 423).…”
Section: Introductionmentioning
confidence: 99%