G Et a C Ue on Is S Ecurity T Raining : E Xplaining the D Ifference between How

نویسندگان

  • Jeffrey L. Jenkins
  • Alexandra Durcikova
  • Mary B. Burns
چکیده

Secure behavior, defined as users’ compliance with their organization’s password policy, is critical for sustaining a profitable and operational organization. Training that provides security arguments and promotes systematic cognitive processing has been shown to be an effective mechanism for improving secure behavior. Training by providing security cues, on the other hand, has been criticized as having a short-lived and unpredictable influence on secure behavior. This paper challenges this criticism by explaining how security cues influence secure behavior and when they are more effective in influencing secure behavior than security arguments. We hypothesize the different theoretical mechanisms through which security arguments and security cues influence secure behavior. We further hypothesize that when users’ attitude toward behaving secure is poor, security arguments should be used. However, when users’ attitude toward behaving secure is positive, security cues should be used. This paper suggests how to test our proposed hypotheses in an experimental setting.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Amitraz Poisoning; A case study

A m i t r a z, a n i ns e c t i c i d e /a ca ri c i de of the f o r m a m i d i n e p e st i c i d e s group, is a ? 2 a d r e n e r g i c ag on i st a nd of t he a m i d i ne c h e m i ca l f a m il y generally us e d to c o n t r ol animal e c top a r a s i t e s. Poisoning due to am i t r a z i s r a r e and character...

متن کامل

On Total Edge Irregularity Strength of Staircase Graphs and Related Graphs

Let G=(V(G),E(G)) be a connected simple undirected graph with non empty vertex set V(G) and edge set E(G). For a positive integer k, by an edge irregular total k-labeling we mean a function f : V(G)UE(G) --> {1,2,...,k} such that for each two edges ab and cd, it follows that f(a)+f(ab)+f(b) is different from f(c)+f(cd)+f(d), i.e. every two edges have distinct weights. The minimum k for which G ...

متن کامل

σ-sporadic prime ideals and superficial elements

Let $A$ be a Noetherian ring, $I$ be an ideal of $A$ and $sigma$ be a semi-prime operation, different from the identity map on the set of all ideals of $A$. Results of Essan proved that the sets of associated prime ideals of $sigma(I^n)$, which denoted by $Ass(A/sigma(I^n))$, stabilize to $A_{sigma}(I)$. We give some properties of the sets $S^{sigma}_{n}(I)=Ass(A/sigma(I^n))setminus A_{sigma}(I...

متن کامل

شبیه‌سازی انسان؛ چالشی نو فراروی اخلاق و حقوق بشر

On entend par le terme «clonage humain» deux types de pratiques: le clonage reproductif et le clonage non – reproductif. Le premier, dont la fin est la reproduction, consiste a transférer le noyau d’une cellule dans un ovocyte énuclée afin d’obtenir un embryon humain génétiquement identique au donneur. Ici, l’embryon cultive...

متن کامل

نقش ژن mexZ در مقاومت به سیپروفلوکساسین در جدایه های سودوموناس آئروژینوزا در استان گیلان

Messadi AA, Lamia T, Kamel B, Salima O, Monia M, Saida BR. Association between antibiotic use and changes in susceptibility patterns of Pseudomonas aeruginosa in an intensive care burn unit: a 5-year study, 2000-2004. Burns :J Int Soc Burn Injuries 2008;34(8):1098-102. Sherertz RJ, Sarubbi FA. A three-year study of nosocomial infections associated with Pseudomonas aeruginosa. J Clin Micr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011