Evaluating usage control deterrents

نویسندگان

  • Keshnee Padayachee
  • Jan H. P. Eloff
چکیده

This paper explores the effectiveness of usage control deterrents. Usage control enables finer-grained control over the usage of objects than do traditional access control models. Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. In this context, an adaptation of usage control is assessed as a proactive means of deterrence control to protect information that cannot be adequately or reasonably protected by access control. These deterrents are evaluated using the design science methodology. Parallel prototypes were developed with the aim of producing multiple alternatives, thereby shifting the focus from purely usability testing to model testing. CATEGORIES AND SUBJECT DESCRIPTORS D.4.6S [Security and Protection]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why users (fail to) read computer usage policies

Purpose – This paper aims to improve understanding of individuals’ awareness and perceptions of computer usage policies (CUPs) and why individuals elect not to read these policies. Design/methodology/approach – MBA students were asked to complete an online survey evaluating their behavioral intention to read CUPs, as well as their performance of this behavior. Factors contributing to the intent...

متن کامل

Oesophageal chemoreceptors of blue crabs, Callinectes sapidus, sense chemical deterrents and can block ingestion of food.

Decapod crustaceans such as blue crabs possess a variety of chemoreceptors that control different stages of the feeding process. All these chemoreceptors are putative targets for feeding deterrents that cause animals to avoid or reject otherwise palatable food. As a first step towards characterizing the chemoreceptors that mediate the effect of deterrents, we used a behavioral approach to inves...

متن کامل

Using web systems for e-procurement: an extension of the unified theory of acceptance and use of technology

This paper is research in progress on an extension of the Unified Theory of Acceptance and Use of Technology (UTAUT) to web systems usage for e-procurement. Focusing on business-to-business transactions, this research explores an extended version of the UTAUT that integrates core drivers and deterrents of web systems usage and investigates the consequence of such usage on corporate buyers. Data...

متن کامل

Laboratory evaluation of 21 insect repellents as larvicides and as oviposition deterrents of Aedes albopictus (Diptera: Culicidae).

Twenty-one commercial insect repellent products, including 12 botanical, 6 DEET-based, and 3 synthetic organics, were evaluated as larvicides and as oviposition deterrents of Aedes albopictus. Ten of the 12 botanical products at 0.1% concentration provided 57-100% mortality of laboratory-reared 4th-stage Ae. albopictus larvae at 24 h after treatment. Five of the 6 DEET-based products and 3 synt...

متن کامل

Chronically homeless women's perceived deterrents to contraception.

CONTEXT Despite the growing number of homeless women of reproductive age, little is known about their reproductive health and contraceptive use. METHODS A representative sample of 974 currently homeless women surveyed in Los Angeles County in 1997 included 229 who were chronically homeless and at risk for unintended pregnancy. The relationships between perceived deterrents among these women a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • South African Computer Journal

دوره 48  شماره 

صفحات  -

تاریخ انتشار 2012