首页> 外文期刊>Information systems frontiers >The quest for complete security: An empirical analysis of users' multi-layered protection from security threats
【24h】

The quest for complete security: An empirical analysis of users' multi-layered protection from security threats

机译:追求完全安全:对用户多层保护免受安全威胁的实证分析

获取原文
获取原文并翻译 | 示例
           

摘要

Individuals can perform many different behaviors to protect themselves from computer security threats. Research, however, generally explores computer security behaviors in isolation, typically looking at one behavior per study, such as usage of malware or strong passwords. However, defense in depth requires that multiple behaviors be performed concurrently for one's computer to be protected. Addressing this gap in prior research, this study measures 279 individuals' computer security behaviors and analyzes them with multi-dimensional scaling. We examined three security threats: security related performance degradation, identify theft, and data loss. The results present a mapping of security behaviors performed together with other behaviors on two dimensions for each of these threats. Using expert reviews of the resulting dimensions, the study proposes that response efficacy and response cost help explain why people perform certain behaviors together. These findings can help explain inconsistent results in prior information security research because they focused on one behavior only whereas people perform various security behaviors together in an effort to mitigate specific security threats. The study informs research and practice by identifying security threat-response pairs via expert interviews, surveying individuals on how they perform multiple security behaviors concurrently to mitigate security threats, identifying why certain behaviors are performed together, and using these findings to identify reasons why IS security research has confounding results based on specific individual threat-response pairs used in prior studies.
机译:个人可以执行许多不同的行为来保护自己免受计算机安全威胁。然而,研究通常探讨了孤立的计算机安全行为,通常看每个研究的一种行为,例如恶意软件或强密码的使用。但是,深度防御要求对要保护的计算机同时执行多种行为。解决此次研究中的这种差距,本研究措施衡量279个个人的计算机安全行为,并通过多维缩放分析它们。我们检查了三种安全威胁:安全相关性能下降,识别盗窃和数据丢失。结果呈现与每个威胁中的两个维度一起执行的安全行为的映射。使用所产生的尺寸的专家评论,该研究提出了响应疗效和反应成本有助于解释为什么人们一起在一起执行某些行为。这些发现可以帮助解释先前信息安全研究中的不一致结果,因为它们仅关注一种行为,而人们在努力减轻具体的安全威胁的努力中履行各种安全行为。该研究通过专家访谈识别安全威胁响应对来提供研究和实践,调查个人如何同时执行多个安全行为来缓解安全威胁,识别为什么某些行为一起执行,并使用这些发现来标识为什么安全的原因基于先前研究中使用的特定个体威胁反应对具有混淆结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号