首页> 外文期刊>Information systems frontiers >The quest for complete security: An empirical analysis of users' multi-layered protection from security threats
【24h】

The quest for complete security: An empirical analysis of users' multi-layered protection from security threats

机译:寻求完全安全性:对用户免受安全威胁的多层保护的实证分析

获取原文
获取原文并翻译 | 示例
           

摘要

Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or strong passwords. However, defense in depth requires that multiple behaviors be performed concurrently for one's computer to be protected. Addressing this gap in prior research, this study measures 279 individuals' computer security behaviors and analyzes them with multi-dimensional scaling. We examined three security threats: security related performance degradation, identify theft, and data loss. The results present a mapping of security behaviors performed together with other behaviors on two dimensions for each of these threats. Using expert reviews of the resulting dimensions, the study proposes that response efficacy and response cost help explain why people perform certain behaviors together. These findings can help explain inconsistent results in prior information security research because they focused on one behavior only whereas people perform various security behaviors together in an effort to mitigate specific security threats. The study informs research and practice by identifying security threat-response pairs via expert interviews, surveying individuals on how they perform multiple security behaviors concurrently to mitigate security threats, identifying why certain behaviors are performed together, and using these findings to identify reasons why IS security research has confounding results based on specific individual threat-response pairs used in prior studies.
机译:个人可以执行许多不同的行为来保护自己免受计算机安全威胁。但是,研究通常通常独立地探索计算机安全行为,通常每次研究仅关注一种行为,例如恶意软件或强密码的使用。但是,深度防御要求同时执行多种行为以保护计算机。为了弥补先前研究中的这一空白,本研究测量了279个人的计算机安全行为,并使用多维尺度对其进行了分析。我们研究了三种安全威胁:与安全相关的性能下降,识别盗窃和数据丢失。结果提供了针对这些威胁中的每一个在二维上执行的安全行为与其他行为的映射。通过对由此产生的维度进行专家审查,该研究提出,响应效率和响应成本有助于解释人们为什么一起执行某些行为。这些发现可以帮助解释先前的信息安全研究中不一致的结果,因为它们仅关注一种行为,而人们为了减轻特定的安全威胁而共同执行各种安全行为。该研究通过专家访谈识别安全威胁-响应对,调查个人如何同时执行多种安全行为以减轻安全威胁,确定为什么同时执行某些行为,并利用这些发现来确定IS安全的原因,从而为研究和实践提供依据。基于先前研究中使用的特定个体威胁响应对,研究结果令人困惑。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号