Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior

نویسندگان

  • Jeffrey L. Jenkins
  • Alexandra Durcikova
  • Grayson Ross
  • Jay F. Nunamaker
چکیده

The human is frequently referred to as the weakest link of security. Employees who engage in behaviors contrary to their organization’s security policy often cause undesirable outcomes. This research presents a dual-processing model explaining and predicting secure behavior in relation to password policies. The model posits that the number of password security layers (technical controls), training (educational controls), and manager attitude toward secure behavior (managerial controls) influence secure behavior directly and also indirectly through security policy satisfaction. An experiment was designed to test our model utilizing a realistic corporate environment that captures users’ security policy compliance. The results show that the combination of low technical controls and the presence of training significantly increase new employees’ compliance with the security policy. Positive managerial controls and low technical controls increase satisfaction with the security policy; however, satisfaction with the security policy was not significantly related to secure behavior for new employees.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

متن کامل

عوامل ترغیب‌کننده مطالعه در میان مراجعان کتابخانه‌های عمومی شهر ساری

Purpose: In this paper, the goal is offering a research report about viewpoints of Sari City public libraries in Iran about what factors can cause an increase in book reading habits of the inhabitants of this city. Methodology: I used survey method for achieving the goal. Population of study was all users of Sari city public libraries that consisted of 15000 members. 385 members selected by si...

متن کامل

The Mediating Role of Perceived Social Support between Social media Addiction and Attachment Styles in Adult Instagram users in Tehran

The research aimed to study the mediating role of perceived social support in the relation between adult attachment styles and social media addiction of Instagram users The statistical population of the study consisted of adult Instagram users in Tehran. The sample comprised 50 adults aged 18-60 who completed the measures adult attachment styles scale. perceived social support inquiry and socia...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010