Search results
1 – 8 of 8Dirk P. Snyman and Hennie Kruger
This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.
Abstract
Purpose
This paper aims to present the development of a framework for evaluating group behaviour in information security in practice.
Design/methodology/approach
Information security behavioural threshold analysis is used as the theoretical foundation for the proposed framework. The suitability of the proposed framework is evaluated based on two sets of qualitative measures (general frameworks and information security frameworks) which were identified from literature. The successful evaluation of the proposed framework, guided by the identified evaluation measures, is presented in terms of positive practical applications, as well as positive peer review and publication of the underlying theory.
Findings
A methodology to formalise a framework to analyse group behaviour in information security can successfully be applied in a practical environment. This application takes the framework from only a theoretical conceptualisation to an implementable solution to evaluate and positively influence information security group behaviour.
Practical implications
Behavioural threshold analysis is identified as a practical mechanism to evaluate information security group behaviour. The suggested framework, as implemented in a management decision support system (DSS), allows practitioners to assess the security behaviour and awareness in their organisation. The resulting information can be used to exert an influence for positive change in the information security of the organisation.
Originality/value
A novel conceptual mapping of two sets of qualitative evaluation measures is presented and used to evaluate the proposed framework. The resulting framework is made practical through its encapsulation in a DSS.
Details
Keywords
Dirk P. Snyman, Hennie Kruger and Wayne D. Kearney
The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.
Abstract
Purpose
The purpose of this paper is to investigate the lemming effect as a possible cause for the privacy paradox in information security.
Design/methodology/approach
Behavioural threshold analysis is used to test for the presence of the lemming effect in information security behaviour. Paradoxical behaviour may be caused by the influential nature of the lemming effect. The lemming effect is presented as a possible cause of the privacy paradox.
Findings
The behavioural threshold analysis indicates that the lemming effect is indeed present in information security behaviour and may lead to paradoxical information security behaviour.
Practical implications
The analysis of the lemming effect can be used to assist companies in understanding the way employees influence each other in their behaviour in terms of security. By identifying possible problem areas, this approach can also assist in directing their information security education endeavours towards the most relevant topics.
Originality/value
This research describes the first investigation of the lemming effect in information security by means of behavioural threshold analysis in practice.
Details
Keywords
Wayne D. Kearney and Hennie A. Kruger
The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.
Abstract
Purpose
The purpose of this paper is to discuss and theorise on the appropriateness and potential impact of risk homeostasis in the context of information security.
Design/methodology/approach
The discussion is mainly based on a literature survey backed up by illustrative empirical examples.
Findings
Risk homeostasis in the context of information security is an under-explored topic. The principles, assumptions and methodology of a risk homeostasis framework offer new insights and knowledge to explain and predict contradictory human behaviour in information security.
Practical implications
The paper shows that explanations for contradictory human behaviour (e.g. the privacy paradox) would gain from considering risk homeostasis as an information security risk management model. The ideas discussed open up the prospect to theorise on risk homeostasis as a framework in information security and should form a basis for further research and practical implementations. On a more practical level, it offers decision makers useful information and new insights that could be advantageous in a strategic security planning process.
Originality/value
This is the first systematic comprehensive review of risk homeostasis in the context of information security behaviour and readers of the paper will find new theories, guidelines and insights on risk homeostasis.
Details
Keywords
The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.
Abstract
Purpose
The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.
Design/methodology/approach
Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour.
Findings
Initial experimental results show that behavioural threshold analysis is feasible in the context of information security and may provide useful guidelines on how to construct information security awareness programmes.
Practical implications
Threshold analysis may contribute in a number of ways to information security, e.g. identification of security issues that are susceptible to peer pressure and easily influenced by peer behaviour; serve as a countermeasure against security fatigue; contribute to the economics of information security awareness programmes; track progress of security awareness campaigns; and provide a new measure for determining the importance of security awareness issues.
Originality/value
This paper describes the very first experiment to test the behavioural threshold analysis concepts in the context of information security.
Details
Keywords
Hennie Kruger, Lynette Drevin and Tjaart Steyn
The dependence on human involvement and human behavior to protect information assets necessitates an information security awareness program to make people aware of their roles and…
Abstract
Purpose
The dependence on human involvement and human behavior to protect information assets necessitates an information security awareness program to make people aware of their roles and responsibilities towards information security. The purpose of this paper is to examine the feasibility of an information security vocabulary test as an aid to assess awareness levels and to assist with the identification of suitable areas or topics to be included in an information security awareness program.
Design/methodology/approach
A questionnaire has been designed to test and illustrate the feasibility of a vocabulary test. The questionnaire consists of two sections – a first section to perform a vocabulary test and a second one to evaluate respondents' behavior. Two different class groups of students at a university were used as a sample.
Findings
The research findings confirmed that the use of a vocabulary test to assess security awareness levels will be beneficial. A significant relationship between knowledge of concepts (vocabulary) and behavior was observed.
Originality/value
The paper introduces a new approach to evaluate people's information security awareness levels by employing an information security vocabulary test. This new approach can assist management to plan and evaluate interventions and to facilitate best practice in information security. Aspects of cognitive psychology and language were taken into account in this research project, indicating the interaction and influence between apparently different disciplines.
Details
Keywords