首页 > 最新文献

Information and Computer Security最新文献

英文 中文
Value conflicts and information security – a mixed-methods study in high-risk industry 价值冲突与信息安全——高风险行业的混合方法研究
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-21 DOI: 10.1108/ics-09-2021-0139
Kristina Gyllensten, A. Pousette, Marianne Törner
PurposeThe purpose of this study is to investigate the influence of work-related value conflicts on information security in two organisations in nuclear power production and related industry.Design/methodology/approachA mixed-methods design was applied. Individual interviews were conducted with 24 employees of two organisations in Sweden and questionnaire data on information security climate were collected from 667 employees (62%) in the same two organisations.FindingsThe qualitative part of the study identified five different types of value conflicts influencing information security behaviour. The quantitative part of the study found that value conflicts relating to information security had a negative relationship with rule-compliant behaviour. The opposite was found for participative security behaviour where there was a positive relationship with value conflicts. A high climate of information security was positively related to both rule-compliant and participative information security behaviour. It also moderated the effect of value conflicts on compliant information security behaviour.Originality/valueThis paper highlights organisational contextual conditions that influence employees’ motivation and ability to manage value conflicts relating to information security in a high-risk industry. It also enables a better understanding of the influence of the information security climate on information security in the presence of value conflicts in this type of industry.
目的本研究旨在探讨核电生产及相关产业中两个组织的工作价值冲突对资讯安全的影响。设计/方法学/方法采用混合方法设计。对瑞典两个组织的24名员工进行了个人访谈,并从同一两个组织的667名员工(62%)中收集了有关信息安全气候的问卷数据。研究的定性部分确定了影响信息安全行为的五种不同类型的价值冲突。研究的定量部分发现,与信息安全相关的价值冲突与合规行为呈负相关。而参与性安全行为则与价值冲突呈正相关。高度的信息安全氛围与规则遵从性和参与性信息安全行为呈正相关。它还调节了价值观冲突对合规信息安全行为的影响。原创性/价值这篇论文强调了影响员工在高风险行业中管理与信息安全相关的价值冲突的动机和能力的组织背景条件。它也使人们能够更好地理解信息安全气候对信息安全的影响,在这种类型的行业存在价值冲突。
{"title":"Value conflicts and information security – a mixed-methods study in high-risk industry","authors":"Kristina Gyllensten, A. Pousette, Marianne Törner","doi":"10.1108/ics-09-2021-0139","DOIUrl":"https://doi.org/10.1108/ics-09-2021-0139","url":null,"abstract":"\u0000Purpose\u0000The purpose of this study is to investigate the influence of work-related value conflicts on information security in two organisations in nuclear power production and related industry.\u0000\u0000\u0000Design/methodology/approach\u0000A mixed-methods design was applied. Individual interviews were conducted with 24 employees of two organisations in Sweden and questionnaire data on information security climate were collected from 667 employees (62%) in the same two organisations.\u0000\u0000\u0000Findings\u0000The qualitative part of the study identified five different types of value conflicts influencing information security behaviour. The quantitative part of the study found that value conflicts relating to information security had a negative relationship with rule-compliant behaviour. The opposite was found for participative security behaviour where there was a positive relationship with value conflicts. A high climate of information security was positively related to both rule-compliant and participative information security behaviour. It also moderated the effect of value conflicts on compliant information security behaviour.\u0000\u0000\u0000Originality/value\u0000This paper highlights organisational contextual conditions that influence employees’ motivation and ability to manage value conflicts relating to information security in a high-risk industry. It also enables a better understanding of the influence of the information security climate on information security in the presence of value conflicts in this type of industry.\u0000","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"39 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77532277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding social media users’ privacy-protection behaviors 了解社交媒体用户的隐私保护行为
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-17 DOI: 10.1108/ics-07-2021-0099
L. Baker-Eveleth, Robert Stone, Daniel M. Eveleth
PurposeThis study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the number of users and functionality; it is important to understand social media user privacy-protection behaviors and the users’ psychological underpinnings driving those behaviors. Among these, perceptions are the users’ evaluation of their privacy concerns and data sharing benefits inherent in social media use which influence the users’ behaviors to protect their privacy.Design/methodology/approachTo research these issues, a theoretical model and hypotheses were developed, based on self-efficacy theory. The theoretical model was empirically tested using 193 questionnaire responses collected from students enrolled in business courses at a medium-sized university in the western USA. All the respondents reported that they routinely use social media. The empirical analysis was performed using structural equations modeling in PC SAS version 9.4, procedure Calis.FindingsThe estimation of the paths in the structural model indicates that privacy concerns positively influence social media users’ protection behaviors while the perceived benefits of data sharing negatively influence protection behaviors. Privacy experience positively influences privacy concerns. Alternatively, social media use positively influences social media self-efficacy and perceived usefulness, which, in turn, have meaningful influences on data sharing benefits.Originality/valuePrevious findings about the effect of self-efficacy on protection behaviors has been inconclusive. This study adds some clarity. Specifically, the findings suggest that the effect depends upon the foci of self-efficacy. While higher self-efficacy with respect to using privacy-related features of a specific technology tends to lead to greater privacy concerns, higher self-efficacy with respect to the more general technology (e.g. social media, computer) seems to affect protection behaviors through perceived benefits. Further, the results of this study offer conclusions about the roles that privacy experiences, social media use and perceived social media benefits play in affecting protection behaviors.
目的本研究旨在确定隐私体验和社交媒体使用在影响隐私保护行为中的作用。随着社交媒体在用户数量和功能方面的扩展;了解社交媒体用户的隐私保护行为以及驱动这些行为的用户心理基础是很重要的。其中,感知是用户对社交媒体使用中固有的隐私问题和数据共享利益的评估,这些利益会影响用户保护隐私的行为。设计/方法/途径为了研究这些问题,基于自我效能理论,提出了一个理论模型和假设。通过对美国西部一所中等规模大学商科课程学生的193份问卷调查,对理论模型进行了实证检验。所有受访者都表示,他们经常使用社交媒体。实证分析采用结构方程建模的PC SAS版本9.4,程序Calis。结构模型的路径估计表明,隐私关注正向影响社交媒体用户的保护行为,而数据共享的感知利益负向影响保护行为。隐私体验正向影响隐私关注。另一方面,社交媒体使用正向影响社交媒体自我效能感和感知有用性,而社交媒体自我效能感和感知有用性反过来又对数据共享利益产生有意义的影响。原创性/价值先前关于自我效能感对保护行为影响的研究尚无定论。这项研究增加了一些清晰度。具体来说,研究结果表明,这种影响取决于自我效能感的焦点。虽然在使用特定技术的隐私相关功能方面,较高的自我效能感往往会导致更大的隐私担忧,但在使用更通用的技术(如社交媒体、计算机)方面,较高的自我效能感似乎会通过感知利益影响保护行为。此外,本研究的结果提供了关于隐私体验、社交媒体使用和感知社交媒体利益在影响保护行为中的作用的结论。
{"title":"Understanding social media users’ privacy-protection behaviors","authors":"L. Baker-Eveleth, Robert Stone, Daniel M. Eveleth","doi":"10.1108/ics-07-2021-0099","DOIUrl":"https://doi.org/10.1108/ics-07-2021-0099","url":null,"abstract":"\u0000Purpose\u0000This study aims to identify the roles that privacy experiences and social media use play in influencing privacy-protection behaviors. As social media use expands in terms of the number of users and functionality; it is important to understand social media user privacy-protection behaviors and the users’ psychological underpinnings driving those behaviors. Among these, perceptions are the users’ evaluation of their privacy concerns and data sharing benefits inherent in social media use which influence the users’ behaviors to protect their privacy.\u0000\u0000\u0000Design/methodology/approach\u0000To research these issues, a theoretical model and hypotheses were developed, based on self-efficacy theory. The theoretical model was empirically tested using 193 questionnaire responses collected from students enrolled in business courses at a medium-sized university in the western USA. All the respondents reported that they routinely use social media. The empirical analysis was performed using structural equations modeling in PC SAS version 9.4, procedure Calis.\u0000\u0000\u0000Findings\u0000The estimation of the paths in the structural model indicates that privacy concerns positively influence social media users’ protection behaviors while the perceived benefits of data sharing negatively influence protection behaviors. Privacy experience positively influences privacy concerns. Alternatively, social media use positively influences social media self-efficacy and perceived usefulness, which, in turn, have meaningful influences on data sharing benefits.\u0000\u0000\u0000Originality/value\u0000Previous findings about the effect of self-efficacy on protection behaviors has been inconclusive. This study adds some clarity. Specifically, the findings suggest that the effect depends upon the foci of self-efficacy. While higher self-efficacy with respect to using privacy-related features of a specific technology tends to lead to greater privacy concerns, higher self-efficacy with respect to the more general technology (e.g. social media, computer) seems to affect protection behaviors through perceived benefits. Further, the results of this study offer conclusions about the roles that privacy experiences, social media use and perceived social media benefits play in affecting protection behaviors.\u0000","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"151 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2021-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89002304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the accessibility and impacts of cybersecurity programs on high-school girls’ long-term industry engagement 调查网络安全项目对高中女生长期行业参与的可及性和影响
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-10-29 DOI: 10.1108/ics-05-2021-0067
Mridula Shan, Jeong Yang
PurposeThe purpose of this study is to investigate whether having accessible cybersecurity programs (CPs) for high-school students affected girls’ long-term engagement with the industry, given that they already had interests in technology. Although much research has been done to evaluate how high-school science, technology, engineering, and mathematics programs retain girls in computing fields, it is necessary to see if this same long-term engagement exists in cybersecurity-specific programs.Design/methodology/approachIn total, 55 members were surveyed from the aspirations in computing community regarding their experience in and accessibility to high-school CPs. A quantitative analysis of such responses was then undertaken using inferential statistical tools and chi-squared tests for independence.FindingsThe results showed that the existence of CPs alone are not influential factors in increasing long-term engagement with the field, showcasing that the high-knowledge barrier of CPs affects many students (even those with prior interests in technology). Instead, by having multiple occurrences of these programs and providing more cybersecurity resources to areas that lacked them, girls were more likely to report an increased interest in the field.Practical implicationsSuch information can support future program leaders to develop effective, accessible and more targeted cybersecurity initiatives for students of various communities.Originality/valueBy analyzing the unique interactions of tech-aspiring women with cybersecurity, this exploration was able to demonstrate that women of different computing experiences face a shared barrier when entering the cybersecurity field. Likewise, in comparing these perspectives across different age groups, the investigation highlighted the development and subsequent growth of cybersecurity programming over the years and why such initiatives should be supported into the future.
本研究的目的是调查为高中生提供可访问的网络安全计划(CPs)是否会影响女孩对该行业的长期参与,因为她们已经对技术感兴趣。尽管已经做了很多研究来评估高中科学、技术、工程和数学课程是如何让女孩留在计算机领域的,但有必要看看在网络安全专业课程中是否也存在同样的长期参与。设计/方法/方法共有55名成员接受了调查,内容涉及他们在计算机社区的经验和对高中cp的可及性。然后使用推理统计工具和卡方独立性检验对这些反应进行定量分析。结果表明,CPs本身的存在并不是增加长期参与该领域的影响因素,这表明CPs的高知识障碍影响了许多学生(甚至是那些先前对技术感兴趣的学生)。相反,通过多次开展这些项目,并向缺乏这些项目的地区提供更多的网络安全资源,女孩们更有可能对这一领域产生更大的兴趣。这些信息可以支持未来的项目领导者为不同社区的学生制定有效的、可访问的和更有针对性的网络安全计划。独创性/价值通过分析有技术抱负的女性与网络安全的独特互动,这项研究能够证明,不同计算经验的女性在进入网络安全领域时面临着共同的障碍。同样,在比较不同年龄组的这些观点时,调查强调了多年来网络安全计划的发展和随后的增长,以及为什么这些计划应该在未来得到支持。
{"title":"Investigating the accessibility and impacts of cybersecurity programs on high-school girls’ long-term industry engagement","authors":"Mridula Shan, Jeong Yang","doi":"10.1108/ics-05-2021-0067","DOIUrl":"https://doi.org/10.1108/ics-05-2021-0067","url":null,"abstract":"\u0000Purpose\u0000The purpose of this study is to investigate whether having accessible cybersecurity programs (CPs) for high-school students affected girls’ long-term engagement with the industry, given that they already had interests in technology. Although much research has been done to evaluate how high-school science, technology, engineering, and mathematics programs retain girls in computing fields, it is necessary to see if this same long-term engagement exists in cybersecurity-specific programs.\u0000\u0000\u0000Design/methodology/approach\u0000In total, 55 members were surveyed from the aspirations in computing community regarding their experience in and accessibility to high-school CPs. A quantitative analysis of such responses was then undertaken using inferential statistical tools and chi-squared tests for independence.\u0000\u0000\u0000Findings\u0000The results showed that the existence of CPs alone are not influential factors in increasing long-term engagement with the field, showcasing that the high-knowledge barrier of CPs affects many students (even those with prior interests in technology). Instead, by having multiple occurrences of these programs and providing more cybersecurity resources to areas that lacked them, girls were more likely to report an increased interest in the field.\u0000\u0000\u0000Practical implications\u0000Such information can support future program leaders to develop effective, accessible and more targeted cybersecurity initiatives for students of various communities.\u0000\u0000\u0000Originality/value\u0000By analyzing the unique interactions of tech-aspiring women with cybersecurity, this exploration was able to demonstrate that women of different computing experiences face a shared barrier when entering the cybersecurity field. Likewise, in comparing these perspectives across different age groups, the investigation highlighted the development and subsequent growth of cybersecurity programming over the years and why such initiatives should be supported into the future.\u0000","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"2016 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89901797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Advocates: Discovering the Characteristics and Skills of an Emergent Role. 网络安全倡导者:发现一个新兴角色的特征和技能。
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.1108/ics-08-2020-0131
Julie M Haney, Wayne G Lutters

Purpose: Cybersecurity advocates safeguard their organizations by promoting security best practices. However, little is known about what constitutes successful advocacy.

Methodology: We conducted 28 in-depth interviews of cybersecurity advocates.

Findings: Effective advocates not only possess technical acumen, but also interpersonal skills, communication acumen, context awareness, and a customer service orientation.

Originality: We are the first to define and enumerate competencies for the role of cybersecurity advocate.

Implications: Non-technical skills are deemphasized in cybersecurity training, limiting career progression into the cybersecurity advocate role for existing security professionals and those from other disciplines. We suggest improvements for professional development that encourage greater security workforce diversity.

目的:网络安全倡导者通过推广安全最佳实践来保护他们的组织。然而,人们对什么是成功的倡导知之甚少。方法:我们对网络安全倡导者进行了28次深度访谈。研究发现:有效的倡导者不仅具有技术敏锐度,还具有人际交往能力、沟通敏锐度、情境意识和客户服务导向。原创性:我们是第一个定义和列举网络安全倡导者角色的能力。影响:非技术技能在网络安全培训中不被重视,限制了现有安全专业人员和其他学科人员进入网络安全倡导者角色的职业发展。我们建议改进专业发展,鼓励更多的安保人员多样化。
{"title":"Cybersecurity Advocates: Discovering the Characteristics and Skills of an Emergent Role.","authors":"Julie M Haney,&nbsp;Wayne G Lutters","doi":"10.1108/ics-08-2020-0131","DOIUrl":"https://doi.org/10.1108/ics-08-2020-0131","url":null,"abstract":"<p><strong>Purpose: </strong>Cybersecurity advocates safeguard their organizations by promoting security best practices. However, little is known about what constitutes successful advocacy.</p><p><strong>Methodology: </strong>We conducted 28 in-depth interviews of cybersecurity advocates.</p><p><strong>Findings: </strong>Effective advocates not only possess technical acumen, but also interpersonal skills, communication acumen, context awareness, and a customer service orientation.</p><p><strong>Originality: </strong>We are the first to define and enumerate competencies for the role of cybersecurity advocate.</p><p><strong>Implications: </strong>Non-technical skills are deemphasized in cybersecurity training, limiting career progression into the cybersecurity advocate role for existing security professionals and those from other disciplines. We suggest improvements for professional development that encourage greater security workforce diversity.</p>","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"29 3","pages":""},"PeriodicalIF":1.4,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8628570/pdf/nihms-1753036.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39684282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing cyber security behavior: an internal social marketing approach 强化网络安全行为:一种内部社会营销方法
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-14 DOI: 10.1108/ics-01-2019-0023
H. Pham, L. Brennan, L. Parker, Nhat Tram Phan-Le, I. Ulhaq, M. Nkhoma, M. Nguyen
PurposeUnderstanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This study aims to explore how the 7Ps (product, price, promotion, place, physical evidence, process and people) marketing mix, as part of an internal social marketing approach, can be used to gain an understanding of employees’ interactions within an organization’s cybersecurity environment. This understanding could inform the design of servicescapes and behavioral infrastructure to promote and maintain cybersecurity compliance.Design/methodology/approachThis study adopted an inductive qualitative approach using in-depth interviews with employees in several Vietnamese organizations. Discussions were centered on employee experiences and their perceptions of cybersecurity initiatives, as well as the impact of initiatives on compliance behavior. Responses were then categorized under the 7Ps marketing mix framework.FindingsThe study shows that assessing a cybersecurity program using the 7P mix enables the systematic capture of users’ security compliance and acceptance of IT systems. Additionally, understanding the interactions between system elements permits the design of behavioral infrastructure to enhance security efforts. Results also show that user engagement is essential in developing secure systems. User engagement requires developing shared objectives, localized communications, co-designing of efficient processes and understanding the “pain points” of security compliance. The knowledge developed from this research provides a framework for those managing cybersecurity systems and enables the design human-centered systems conducive to compliance.Originality/valueThe study is one of the first to use a cross-disciplinary social marketing approach to examine how employees experience and comply with security initiatives. Previous studies have mostly focused on determinants of compliance behavior without providing a clear platform for management action. Internal social marketing using 7Ps provides a simple but innovative approach to reexamine existing compliance approaches. Findings from the study could leverage proven successful marketing techniques to promote security compliance.
目的了解系统用户的行为变化过程以采用安全的安全实践对组织的网络安全计划的成功至关重要。本研究旨在探索7p(产品、价格、促销、地点、实物证据、流程和人员)营销组合,作为内部社会营销方法的一部分,如何用于了解员工在组织网络安全环境中的互动。这种理解可以为服务逃逸和行为基础设施的设计提供信息,以促进和维护网络安全合规性。设计/方法/方法本研究采用归纳定性方法,对几个越南组织的员工进行深入访谈。讨论集中在员工体验和他们对网络安全计划的看法,以及计划对合规行为的影响。然后在7p营销组合框架下对回应进行分类。研究结果表明,使用7P组合评估网络安全计划可以系统地捕获用户的安全合规性和对IT系统的接受程度。此外,了解系统元素之间的交互可以设计行为基础设施,以增强安全性。结果还表明,用户参与是开发安全系统必不可少的。用户参与需要开发共享目标、本地化通信、共同设计高效流程以及理解安全遵从性的“痛点”。从本研究中获得的知识为那些管理网络安全系统的人提供了一个框架,并使设计以人为中心的系统有利于合规性。这项研究是首次使用跨学科的社会营销方法来研究员工如何体验和遵守安全举措的研究之一。以往的研究大多集中在合规行为的决定因素上,而没有为管理行动提供一个明确的平台。使用7p的内部社会营销提供了一种简单但创新的方法来重新审视现有的合规方法。这项研究的结果可以利用已被证明成功的营销技术来促进安全合规。
{"title":"Enhancing cyber security behavior: an internal social marketing approach","authors":"H. Pham, L. Brennan, L. Parker, Nhat Tram Phan-Le, I. Ulhaq, M. Nkhoma, M. Nguyen","doi":"10.1108/ics-01-2019-0023","DOIUrl":"https://doi.org/10.1108/ics-01-2019-0023","url":null,"abstract":"\u0000Purpose\u0000Understanding the behavioral change process of system users to adopt safe security practices is important to the success of an organization’s cybersecurity program. This study aims to explore how the 7Ps (product, price, promotion, place, physical evidence, process and people) marketing mix, as part of an internal social marketing approach, can be used to gain an understanding of employees’ interactions within an organization’s cybersecurity environment. This understanding could inform the design of servicescapes and behavioral infrastructure to promote and maintain cybersecurity compliance.\u0000\u0000\u0000Design/methodology/approach\u0000This study adopted an inductive qualitative approach using in-depth interviews with employees in several Vietnamese organizations. Discussions were centered on employee experiences and their perceptions of cybersecurity initiatives, as well as the impact of initiatives on compliance behavior. Responses were then categorized under the 7Ps marketing mix framework.\u0000\u0000\u0000Findings\u0000The study shows that assessing a cybersecurity program using the 7P mix enables the systematic capture of users’ security compliance and acceptance of IT systems. Additionally, understanding the interactions between system elements permits the design of behavioral infrastructure to enhance security efforts. Results also show that user engagement is essential in developing secure systems. User engagement requires developing shared objectives, localized communications, co-designing of efficient processes and understanding the “pain points” of security compliance. The knowledge developed from this research provides a framework for those managing cybersecurity systems and enables the design human-centered systems conducive to compliance.\u0000\u0000\u0000Originality/value\u0000The study is one of the first to use a cross-disciplinary social marketing approach to examine how employees experience and comply with security initiatives. Previous studies have mostly focused on determinants of compliance behavior without providing a clear platform for management action. Internal social marketing using 7Ps provides a simple but innovative approach to reexamine existing compliance approaches. Findings from the study could leverage proven successful marketing techniques to promote security compliance.\u0000","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"4 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81208832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using stage theorizing to make anti-phishing recommendations more effective 使用阶段理论使反网络钓鱼建议更有效
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-10-08 DOI: 10.1108/ics-06-2017-0040
Alain Claude Tambe Ebot
PurposeThis paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective.Design/methodology/approachThis literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects.FindingsThe study finds that phishing research does not consider where victims are residing in qualitatively different stages. Consequently, the recommendations do not often match the specific needs of different victims. This study proposes a prototype for developing stage theories of phishing victims and identifies three stages of phishing victims from analyzing the previous phishing research.Research limitations/implicationsThis study relied on published research on phishing victims. Future research can overcome this problem by interviewing phishing victims. Further, the authors’ recommendation that phishing researchers categorize phishing victims into stages and develop targeted messages is not based on direct empirical evidence. Nonetheless, evidence from cancer research and health psychology suggests that targeted messaging is efficacious and cost-effective. Thus, the impact of targeted messaging in phishing could be quite large.Practical implicationsThe study recommends categorizing individuals into stages, based on their security knowledge and online behaviors, and other similar characteristics they may possess. A stage approach will consider that individuals who at one time clicked on a phishing link because they lacked the requisite security knowledge, after receiving security training, may click on a link because they are overconfident.Originality/valueThe paper explains why proposing anti-phishing recommendations, based on a “one-size fits all” approach has not been very effective (e.g. because it simplifies why people engage in different behaviors). The proposals introduce a new approach to designing and deploying anti-phishing recommendations based on the concept of stages.
目的通过对行为网络钓鱼相关文献的回顾,了解为什么反网络钓鱼建议不是很有效,并提出使建议更有效的方法。本文还探讨了如何从健康传播和心理学的阶段概念,以更有效地提出反对网络钓鱼的建议。设计/方法/方法本文献综述研究侧重于依赖于人类受试者的行为网络钓鱼文献。由于缺乏实用建议和人类受试者等原因,研究被排除在外。研究发现,网络钓鱼研究并没有考虑到受害者所处的不同阶段。因此,这些建议往往不符合不同受害者的具体需要。本研究提出了一个发展网络钓鱼受害者阶段理论的原型,并在分析以往网络钓鱼研究的基础上,确定了网络钓鱼受害者的三个阶段。研究局限/启示本研究依赖于已发表的关于网络钓鱼受害者的研究。未来的研究可以通过采访网络钓鱼受害者来克服这个问题。此外,作者建议网络钓鱼研究人员将网络钓鱼受害者分为不同阶段,并制定有针对性的信息,这并非基于直接的经验证据。尽管如此,来自癌症研究和健康心理学的证据表明,有针对性的信息传递是有效且具有成本效益的。因此,针对性消息传递在网络钓鱼中的影响可能相当大。实际意义该研究建议根据个人的安全知识和上网行为,以及他们可能拥有的其他类似特征,将个人分为不同的阶段。一种阶段方法将考虑到,由于缺乏必要的安全知识而一度点击网络钓鱼链接的个人,在接受安全培训后,可能会因为过于自信而点击链接。原创性/价值这篇论文解释了为什么基于“一刀切”的方法提出反网络钓鱼建议并不是很有效(例如,因为它简化了人们从事不同行为的原因)。提出了一种基于阶段概念设计和部署反网络钓鱼建议的新方法。
{"title":"Using stage theorizing to make anti-phishing recommendations more effective","authors":"Alain Claude Tambe Ebot","doi":"10.1108/ics-06-2017-0040","DOIUrl":"https://doi.org/10.1108/ics-06-2017-0040","url":null,"abstract":"\u0000Purpose\u0000This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective.\u0000\u0000\u0000Design/methodology/approach\u0000This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects.\u0000\u0000\u0000Findings\u0000The study finds that phishing research does not consider where victims are residing in qualitatively different stages. Consequently, the recommendations do not often match the specific needs of different victims. This study proposes a prototype for developing stage theories of phishing victims and identifies three stages of phishing victims from analyzing the previous phishing research.\u0000\u0000\u0000Research limitations/implications\u0000This study relied on published research on phishing victims. Future research can overcome this problem by interviewing phishing victims. Further, the authors’ recommendation that phishing researchers categorize phishing victims into stages and develop targeted messages is not based on direct empirical evidence. Nonetheless, evidence from cancer research and health psychology suggests that targeted messaging is efficacious and cost-effective. Thus, the impact of targeted messaging in phishing could be quite large.\u0000\u0000\u0000Practical implications\u0000The study recommends categorizing individuals into stages, based on their security knowledge and online behaviors, and other similar characteristics they may possess. A stage approach will consider that individuals who at one time clicked on a phishing link because they lacked the requisite security knowledge, after receiving security training, may click on a link because they are overconfident.\u0000\u0000\u0000Originality/value\u0000The paper explains why proposing anti-phishing recommendations, based on a “one-size fits all” approach has not been very effective (e.g. because it simplifies why people engage in different behaviors). The proposals introduce a new approach to designing and deploying anti-phishing recommendations based on the concept of stages.\u0000","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"69 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2018-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78212561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A framework to assist email users in the identification of phishing attacks 帮助电子邮件用户识别网络钓鱼攻击的框架
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2015-10-12 DOI: 10.1108/ICS-10-2014-0070
A. Lötter, L. Futcher
Purpose – The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible phishing attacks, thereby putting their personal information at risk. This paper therefore addresses the human weakness (i.e. the user’s lack of knowledge of phishing attacks which causes them to fall victim to such attacks) as well as the software related issue of email clients not visually assisting and guiding the users through the user interface. Design/methodology/approach – A literature study was conducted in the main field of information security with a specific focus on understanding phishing attacks and a modelling technique was used to represent the proposed framework. This paper argues that the framework can be suitably implemented for email clients to raise awareness about phishing attacks. To validate the framework as a plausible mechanism, it was reviewed by a focus group within the School of Information and Com...
目的-本文的目的是提出一个框架,以解决电子邮件用户在识别可能的网络钓鱼攻击方面没有得到充分的信息或他们的电子邮件客户端的协助,从而使他们的个人信息处于危险之中的问题。因此,本文解决了人类的弱点(即用户缺乏网络钓鱼攻击的知识,导致他们成为此类攻击的受害者)以及与电子邮件客户端相关的软件问题,即电子邮件客户端不能直观地帮助和引导用户通过用户界面。设计/方法论/方法-在资讯安全的主要领域进行了文献研究,特别侧重于了解网络钓鱼攻击,并使用建模技术来表示建议的框架。本文认为,该框架可以适当地用于电子邮件客户端,以提高对网络钓鱼攻击的认识。为了验证该框架是一个合理的机制,信息与通信学院的一个焦点小组对其进行了审查。
{"title":"A framework to assist email users in the identification of phishing attacks","authors":"A. Lötter, L. Futcher","doi":"10.1108/ICS-10-2014-0070","DOIUrl":"https://doi.org/10.1108/ICS-10-2014-0070","url":null,"abstract":"Purpose – The purpose of this paper is to propose a framework to address the problem that email users are not well-informed or assisted by their email clients in identifying possible phishing attacks, thereby putting their personal information at risk. This paper therefore addresses the human weakness (i.e. the user’s lack of knowledge of phishing attacks which causes them to fall victim to such attacks) as well as the software related issue of email clients not visually assisting and guiding the users through the user interface. Design/methodology/approach – A literature study was conducted in the main field of information security with a specific focus on understanding phishing attacks and a modelling technique was used to represent the proposed framework. This paper argues that the framework can be suitably implemented for email clients to raise awareness about phishing attacks. To validate the framework as a plausible mechanism, it was reviewed by a focus group within the School of Information and Com...","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"16 1","pages":"42-52"},"PeriodicalIF":1.4,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76803239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Reengineering the user: privacy concerns about personal data on smartphones 重塑用户:智能手机上个人数据的隐私问题
IF 1.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2015-10-12 DOI: 10.1108/ICS-10-2014-0071
Matina Tsavli, P. Efraimidis, Vasilios Katos, L. Mitrou
Purpose – This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed. Design/methodology/approach – The impact of the applications’ evolutionary increment of permission requests from both the user’s and the developer’s point of view is studied, and finally, a series of remedies against the erosion of users’ privacy is proposed. Findings – The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, today’s smartphone operating systems do not provide an adequate level of protection for the user’s personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices. Research limitations/implications – The proposed approach was evaluated through an examination of the Android’s permission mode...
目的——本文旨在讨论Android操作系统中权限模型引起的隐私和安全问题,以及两个尚未得到充分解决的缺点。设计/方法论/方法——从用户和开发人员的角度研究了应用程序的许可请求的进化增量的影响,最后,提出了一系列针对用户隐私侵蚀的补救措施。研究结果-这项工作的结果表明,尽管从定义上讲,提供智能手机用户个人数据的访问既没有问题,也不违法,但今天的智能手机操作系统并没有为用户的个人数据提供足够的保护。然而,有几个想法可以显著改善这种情况,减轻智能设备用户的隐私担忧。研究限制/影响-通过对Android的许可模式的检查来评估建议的方法…
{"title":"Reengineering the user: privacy concerns about personal data on smartphones","authors":"Matina Tsavli, P. Efraimidis, Vasilios Katos, L. Mitrou","doi":"10.1108/ICS-10-2014-0071","DOIUrl":"https://doi.org/10.1108/ICS-10-2014-0071","url":null,"abstract":"Purpose – This paper aims to discuss the privacy and security concerns that have risen from the permissions model in the Android operating system, along with two shortcomings that have not been adequately addressed. Design/methodology/approach – The impact of the applications’ evolutionary increment of permission requests from both the user’s and the developer’s point of view is studied, and finally, a series of remedies against the erosion of users’ privacy is proposed. Findings – The results of this work indicate that, even though providing access to personal data of smartphone users is by definition neither problematic nor unlawful, today’s smartphone operating systems do not provide an adequate level of protection for the user’s personal data. However, there are several ideas that can significantly improve the situation and mitigate privacy concerns of users of smart devices. Research limitations/implications – The proposed approach was evaluated through an examination of the Android’s permission mode...","PeriodicalId":45298,"journal":{"name":"Information and Computer Security","volume":"21 1","pages":"80-89"},"PeriodicalIF":1.4,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81737075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
Information and Computer Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1