Analysis of end user security behaviors

被引:325
作者
Stanton, JM [1 ]
Stam, KR
Mastrangelo, P
Jolton, J
机构
[1] Syracuse Univ, Sch Informat Studies, Ctr Sci & Technol 4 125, Syracuse, NY 13244 USA
[2] Genesee Survey Serv, Rochester, NY 14623 USA
基金
美国国家科学基金会;
关键词
computer security; behavioral information security; passwords; user behavior; organizational management; surveys;
D O I
10.1016/j.cose.2004.07.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many information security specialists believe that promoting good end user behaviors and constraining bad end user behaviors provide one important method for making information security effective within organizations. Because of the important of end user security-related behaviors, having a systematic viewpoint on the different kinds of behavior that end users enact could provide helpful benefits for managers, auditors, information technologists, and others with an interest in assessing and/or influencing end user behavior. In the present article, we describe our efforts to work with subject matter experts to develop a taxonomy of end user security-related behaviors, test the consistency of that taxonomy, and use behaviors from that taxonomy to conduct a U.S. survey of an important set of end user behaviors. We interviewed 110 individuals who possessed knowledge of end user security-related behaviors, conducted a behavior rating exercise with 49 information technology subject matter experts, and ran a U.S. survey of 1167 end users to obtain self-reports of their password-retated behaviors. Results suggested that six categories of end user security-related behaviors appeared to fit well on a two-dimensional map where one dimension captured the level of technical knowledge needed to enact the behavior and another dimension captured the intentionality of the behavior (including malicious, neutral, and benevolent intentions). Our U.S. survey of non-malicious, tow technical knowledge behaviors related to password creation and sharing showed that password "hygiene" was generally poor but varied substantially across different organization types (e.g., military organizations versus telecommunications companies). Further, we documented evidence that good password hygiene was related to training, awareness, monitoring, and motivation. (c) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:124 / 133
页数:10
相关论文
共 21 条
[1]  
ANDERSON RH, 1999, SECURING US DEFENSE
[2]  
[Anonymous], P WG 11 2 WG 11 1 TC
[3]  
[Anonymous], 2001, INF RESOUR MANAG J
[4]   Potential determinants of heavier internet usage [J].
Armstrong, L ;
Phillips, JG ;
Saling, LL .
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2000, 53 (04) :537-550
[5]   Information system security management in the new millennium [J].
Dhillon, G ;
Backhouse, J .
COMMUNICATIONS OF THE ACM, 2000, 43 (07) :125-128
[6]   Violation of safeguards by trusted personnel and understanding related information security concerns [J].
Dhillon, G .
COMPUTERS & SECURITY, 2001, 20 (02) :165-172
[7]  
ERNST, 2002, GLOBAL INFORMATION S
[8]  
GORDON LA, 2004, CSI FBI COMPUTER CRI
[9]   Evaluating ethical decision making and computer use [J].
Loch, KD ;
Conger, S .
COMMUNICATIONS OF THE ACM, 1996, 39 (07) :74-83
[10]   Incidence and correlates of pathological Internet use among college students [J].
Morahan-Martin, J ;
Schumacher, P .
COMPUTERS IN HUMAN BEHAVIOR, 2000, 16 (01) :13-29