首页> 外文学位 >Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
【24h】

Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study

机译:检查最终用户对个人计算机安全性的观点:定性Q方法论研究

获取原文
获取原文并翻译 | 示例

摘要

The Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group's alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.
机译:个人计算机是现代世界上用途最广泛的发明之一。从1980年代问世以来,企业一直使用这些设备来执行从日常管理任务到复杂的工程活动的所有操作。在没有适当注意安全性的情况下,公司会将其正在进行的操作和数据置于被盗,篡改或破坏的风险中。使用个人计算系统的员工是知识产权的主要保护者,同时也是大多数数据泄露的根源。这项研究的目的是分析反复遭受网络钓鱼攻击的最终用户的态度和行为模式。使用Q方法论的方法,参与者对从最终用户对计算机安全性态度和培训的研究中收集到的陈述的同意或不同程度进行了评分。参与者反应的分析产生了三个因素,这些因素表明了行为和观点的模式,并将参与者分为三类;看门人,遗忘者和遵从者。对这三个小组与研究问题的一致性进行分析后发现,尽管所有小组均在计算机安全程序和策略方面受过良好训练,但其中两个小组在识别网络风险和如何防范威胁方面表现出不足。为了确保公司的安全,最终用户必须将自己视为保护知识产权的主要看门人。可以规避技术,可以破坏密码,并可以渗透系统。因此,应对网络威胁的最有效方法是创建一种警惕文化,每个最终用户都应理解,接受和接受其作为主要责任。

著录项

  • 作者

    Varnadore, Michael Ray.;

  • 作者单位

    University of Phoenix.;

  • 授予单位 University of Phoenix.;
  • 学科 Management.;Information technology.
  • 学位 DM/IST
  • 年度 2018
  • 页码 208 p.
  • 总页数 208
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:52:57

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号