Examining the Role of Organizational Password Security Policies in Individual Password Security Behaviors
نویسنده
چکیده
Organizations typically construct computer access password policies that request or require employees to create “strong” passwords. Challenges arise for these employees in attempting to conform to a long list of difficult and potentially conflicting criteria. This dissertation research-in-progress uses concepts from Behavioral Reasoning Theory, General Deterrence Theory, and other theories to examine the conflicting nature of such policies and their impact on password security behaviors. Results are expected to show that traditional countermeasures, while useful in preventing some IS misuse, are not as effective in preventing password misuse, in part because alternative reasons exist that motivate individuals to engage in insecure behaviors. Contributions to academic research and implications for practitioners are discussed.
منابع مشابه
Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors
The existence of and market for notebooks designed for users to write down passwords illuminates a sharp contrast: what is often prescribed as proper password behavior—e.g., never write down passwords—differs from what many users actually do. These password logbooks and their reviews provide many unique and surprising insights into their users’ beliefs, motivations, and behaviors. We examine th...
متن کاملEncouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior
The human is frequently referred to as the weakest link of security. Employees who engage in behaviors contrary to their organization’s security policy often cause undesirable outcomes. This research presents a dual-processing model explaining and predicting secure behavior in relation to password policies. The model posits that the number of password security layers (technical controls), train...
متن کاملInformation Security Applications of Natural Language Processing Techniques a Dissertation
Topkara, Umut Ph.D., Purdue University, August, 2007. Information Security Applications of Natural Language Processing Techniques . Major Professor: Mikhail J. Atallah. In this thesis we investigate applications of natural language processing (NLP) techniques to information security problems. We present our results in this direction for two important areas: password authentication, and informat...
متن کاملIndividual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to shar...
متن کاملApplying Fuzzy Relations in Role-Based Access Control
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted access permission to all resources assigned to the user that they claim to be. However, numerous studies have shown that most security breaches are done by unauthorized users impersonating as authorized users (e.g. by ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006