Learning from “Shadow Security”: Why understanding non-compliant behaviors provides the basis for effective security

نویسندگان

  • Iacovos Kirlappos
  • Simon Parkin
  • M. Angela Sasse
چکیده

Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past research has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-compliance, a 3 response emerges: shadow security. This describes the instances where securityconscious employees who think they cannot comply with the prescribed security policy create a more fitting alternative to the policies and mechanisms created by the organization’s official security staff. These workarounds are usually not visible to official security and higher management – hence ‘shadow security’. They may not be as secure as the ‘official’ policy would be in theory, but they reflect the best compromise staff can find between getting the job done and managing the risks that the assets they understand face. We conclude that rather than trying to ‘stamp out’ shadow security practices, organizations should learn from them: they provide a starting point ‘workable’ security: solutions that offer effective security and fit with the organization’s business, rather than impede it.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Learning from “Shadow Security:”

Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past research has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-complian...

متن کامل

The Assumptions and Profiles Behind IT Security Behavior

Among the major IT security challenges facing organizations is non-malicious employee behavior that nevertheless poses significant threats to an organization’s IT security. Using a grounded theory methodology, this paper finds that organizational security behaviors are inherently related to employee assumptions regarding the importance of IT security policy compliance and regarding the reason w...

متن کامل

On Management Matters: Why We Must Improve Public Health Management Through Action; Comment on “Management Matters: A Leverage Point for Health Systems Strengthening in Global Health”

Public health management is a pillar of public health practice. Only through effective management can research, theory, and scientific innovation be translated into successful public health action. With this in mind, the U.S. Centers for Disease Control and Prevention (CDC) has developed an innovative program called Improving Public Health Management for Action (IMPACT) which aims to address th...

متن کامل

Family security in the shadow of adjustment the patient's power of couples

Abstract: Objective: This study examined the couple took power in the relationship. Although Islam has entrusted the overall management of life to men, and its purpose is to enter about religious and customary in this field, but the chaff power takes a couple abnormal and pathological. How about that power couples to occur? And community and social gender learning how to influence couples? A...

متن کامل

Investigating food security and food waste control of farm families under drought (A case of Kherameh County)

Introduction For decades, various policy initiatives have been planned to achieve food security. However, the number of malnourished people is growing, especially in rural areas of developing countries. Due to the increase of extreme weather events, such as droughts, and significant depletion of water resources, achieving food security is not an easy task. Therefore, an investigation of rural...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014