首页> 外文OA文献 >Empirical Analysis of Socio-Cognitive Factors Affecting Security Behaviors and Practices of Smartphone Users
【2h】

Empirical Analysis of Socio-Cognitive Factors Affecting Security Behaviors and Practices of Smartphone Users

机译:影响智能手机用户安全行为和实践的社会认知因素的实证分析

摘要

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence of organizational proprietary information and sensitive customer information. In addition to users being the greatest risk to IS security, several studies have shown that many people do not implement even the most basic security countermeasures on their smartphones. The lack of security countermeasures implementation, risky user behavior, and the amount of sensitive information stored and transmitted on smartphones is becoming an ever-increasing problem.A literature review revealed a significant gap in literature pertaining to smartphone security. This study identified six socio-cognitive factors from the domain of traditional computer security which have shown to have an impact on user security behaviors and practices. The six factors this study identified and analyzed are mobile information security self-efficacy, institutional trust, party trust, and awareness of smartphone risks, threats, and vulnerabilities and their influence on smartphone security practices and behaviors. The analysis done in this research was confirmatory factor analysis (CFA) – structural equation modeling (SEM). The goal of this study was to cross-validate previously validated factors within the context of traditional computer security and assess their applicability in the context of smartphone security. Additionally, this study assessed the influential significance of these factors on the security behaviors and practices of smartphone users.This study used a Web-based survey and was distributed to approximately 539 users through Facebook® and LinkedIn® social media outlets which resulted in 275 responses for a 51% response rate. After pre-analysis data screening was completed, there were a total of 19 responses that had to be eliminated due to unengaged responses and outliers leaving 256 responses left to analyze. The results of the analysis found that vulnerability awareness, threat awareness, and risk awareness are interrelated to one another which all in turn had significance in predicting self-efficacy, security practices, and behaviors. This intricate relationship revealed in this study indicates that a user has to have an increased awareness in all three categories of awareness before they can fully understand how to protect themselves. Having an increased awareness in one category does not impact the overall security posture of the user and that risk, threat, and vulnerability awareness all work together. Another interesting find was that as risk awareness increased the less the smartphone users protected themselves. This finding warrants additional research to investigate why the user is more averse to risk, and willing to accept the risk, despite their increased awareness. Finally, institutional trust and party trust was found not to have any significance on any of the factors.These findings should give smartphone users and organizations insight into specific areas to focus on in minimizing inappropriate security behaviors and practices of smartphone users. More specifically, users and organizations need to focus on educating users on all three factors of threats, risks, and vulnerabilities in order for there to have any impact on increasing self-efficacy and reducing inappropriate security behaviors and practices.
机译:信息系统(IS)的总体安全状况取决于IS用户的行为。多项研究表明,用户是IS安全性的最大漏洞。智能手机的普及正在引入一套全新的风险,威胁和漏洞。智能手机设备通过允许智能手机用户即时传输和存储个人身份信息(PII),扩大了此数据暴露问题,这正成为主要的安全风险。此外,公司还利用这些智能手机设备的可用性和强大的计算功能,并开发自带设备(BYOD)程序,该程序使公司易于泄露组织专有信息和敏感的客户信息。除了用户面临最大的IS安全风险外,多项研究还表明,许多人甚至没有在智能手机上实施最基本的安全对策。缺乏安全对策的实施,危险的用户行为以及在智能手机上存储和传输的敏感信息的数量正变得越来越严重。文献综述表明,与智能手机安全性相关的文献存在巨大差距。这项研究从传统的计算机安全领域确定了六个社会认知因素,这些因素已显示出对用户安全行为和实践的影响。这项研究确定和分析的六个因素是移动信息安全自我效能,机构信任,团体信任以及对智能手机风险,威胁和漏洞的了解以及它们对智能手机安全实践和行为的影响。这项研究中进行的分析是验证性因子分析(CFA)–结构方程模型(SEM)。这项研究的目的是在传统计算机安全性的背景下交叉验证先前验证过的因素,并评估它们在智能手机安全性的情况下的适用性。此外,本研究评估了这些因素对智能手机用户安全行为和行为的影响意义。该研究使用了基于Web的调查,并通过Facebook®和LinkedIn®社交媒体分发给了大约539个用户,获得了275条回应回复率为51%。分析前的数据筛选完成后,由于未接合的响应和异常值,总共有19个响应必须被消除,剩下256个​​响应需要分析。分析的结果发现,漏洞意识,威胁意识和风险意识是相互关联的,它们反过来在预测自我效能,安全实践和行为方面具有重要意义。在这项研究中揭示的这种复杂关系表明,用户必须在所有三类意识中都具有增强的意识,才能充分理解如何保护自己。对某一类别的意识提高不会影响用户的整体安全状况,并且风险,威胁和漏洞意识都可以协同工作。另一个有趣的发现是,随着风险意识的增强,智能手机用户保护自己的程度也越来越低。这一发现值得进行进一步的研究,以调查为什么用户尽管对风险的认识有所提高,却还是更愿意承担风险。最后,发现机构信任和团体信任在任何因素上均没有任何意义,这些发现应使智能手机用户和组织能够深入了解特定领域,以最大程度地减少智能手机用户的不当安全行为和做法。更具体地说,用户和组织需要集中精力对用户进行有关威胁,风险和漏洞的所有三个因素的教育,以便对提高自我效能和减少不适当的安全行为和做法产生任何影响。

著录项

  • 作者

    Simpson Joseph P.;

  • 作者单位
  • 年度 2016
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类
  • 入库时间 2022-08-20 20:17:28

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号