Factors in an end user security expertise instrument
نویسندگان
چکیده
Purpose – The purpose of this study is to identify factors that determine computer and security expertise in end users. They can be significant determinants of human behaviour and interactions in the security and privacy context. Standardized, externally valid instruments for measuring end-user security expertise are non-existent. Design/methodology/approach – A questionnaire encompassing skills and knowledge-based questions was developed to identify critical factors that constitute expertise in end users. Exploratory factor analysis was applied on the results from 898 participants from a wide range of populations. Cluster analysis was applied to characterize the relationship between computer and security expertise. Ordered logistic regression models were applied to measure efficacy of the proposed security and computing factors in predicting user comprehension of security concepts: phishing and certificates. Findings – There are levels to peoples’ computer and security expertise that could be reasonably measured and operationalized. Four factors that constitute computer security-related skills and knowledge are, namely, basic computer skills, advanced computer skills, security knowledge and advanced security skills, and these are identified as determinants of computer expertise. Practical implications – Findings fromthisworkcanbeused toguide thedesignof security interfacessuch that it caters to people with different expertise levels and does not force users to exercise more cognitive processes than required. Originality/value – This work identified four factors that constitute security expertise in end users. Findings from this work were integrated to propose a framework called Security SRK for guiding further research on security expertise. This work posits that security expertise instrument for end user should measure three cognitive dimensions: security skills, rules and knowledge.
منابع مشابه
What Can Johnny Do?–Factors in an End-User Expertise Instrument
Security and computer expertise of end users can be significant predictors of user behaviour and interactions in the security and privacy context. Standardized, externally valid instruments for measuring end-user security expertise are non-existent. To address this need, we developed a questionnaire to identify critical factors that constitute expertise in end-users. It combines skills and know...
متن کاملInstrument for Measuring Computing and Security Expertise – TR715
The Science of Security, particularly in the case of human factors and usability, remains inchoate. Individual research groups and researchers develop code, simulations, instruments, dataset and experimental designs that are either not released with adequate detail for reproducibility or simply not reused beyond the individual research group. Through this paper we seek to contribute to the Scie...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملTowards Minimizing Human Factors In End-User Information Security
Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of information systems. This paper addres...
متن کاملDevelopment of an Instrument to Measure Smart Card Technology Acceptance
Recently smart card is used all over the world in different applications such as financial, telecommunication, network, and physical access where the security is considered very crucial. User acceptance is very significant in successful implementation of smart card technology. Thus, in order to investigate the user adoption of the technology, the instrument to identify the user acceptance is ne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. & Comput. Security
دوره 25 شماره
صفحات -
تاریخ انتشار 2017