A Qualitative Investigation of Bank Employee Experiences of Information Security and Phishing

نویسندگان

  • Dan Conway
  • Ronnie Taib
  • Mitch Harris
  • Kun Yu
  • Shlomo Berkovsky
  • Fang Chen
چکیده

Staff behaviour is increasingly understood to be an important determinant of an organisations’ vulnerability to information security breaches. In parallel to the HCI and CSCW literature, models drawn from cognitive and health psychology have suggested a number of mental variables that predict staff response to security threats. This study began with these models, but engaged in a broader, discovery-orientated, qualitative investigation of how these variables were experienced, interacted subjectively, and what further variables might be of relevance. We conducted in-depth, semi-structured interviews consisting of open and closed questions with staff from a financial services institution under conditions of strict anonymity. Results include a number of findings such as a possible association between highly visible security procedures and low perceptions of vulnerability leading to poor security practices. We also found self-efficacy was a strong determinant of staff sharing stories of negative experiences and variances in the number of non-relevant emails that they process. These findings lead to a richer, deeper understanding of staff experiences in relation to information security and phishing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing a Management Model for Employee Empowerment with Information Literacy Focus to Improve Their Training

According to the research on information empowerment and information literacy, the purpose of this study was to present an information literacy empowerment model to train the staff of the Central Bank of the Islamic Republic of Iran.Statistical population in the qualitative part of this applied, qualitative-quantitative exploratory and descriptive-correlational study was conducted by academic e...

متن کامل

Designing a Management Model for Employee Empowerment with Information Literacy Focus to Improve Their Training

According to the research on information empowerment and information literacy, the purpose of this study was to present an information literacy empowerment model to train the staff of the Central Bank of the Islamic Republic of Iran.Statistical population in the qualitative part of this applied, qualitative-quantitative exploratory and descriptive-correlational study was conducted by academic e...

متن کامل

Phishing website detection using weighted feature line embedding

The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...

متن کامل

The Compliance Budget: The Economics of User Effort in Information Security

A significant number of security breaches result from employees’ failure to comply with security policies. The cause may be an honest mistake – e.g. when an employee enters their password in a phishing website, believing it to be a legitimate one (Dhamija et al., 2007), or because they are faced with an impossible task – e.g. when an employee has so many different passwords that she has to writ...

متن کامل

Cybersecurity: Role of Behavioral Training in Healthcare

We were tasked by a global leader in healthcare to look into making the organization more secure by creating a training program that focused on employee habits. By adapting a model from consumer behavior to information security, we were able to find strong correlations between habit creation and security threats such as phishing, unauthorized cloud computing use, and password sharing.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017