Formalization of Influencing in Information Security
نویسندگان
چکیده
Information security decisions typically involve a trade-off between security and productivity. In practical settings it is often the human/user who is best positioned to make this trade-off decision, or in fact has a right to make its own decision (such as in the case of 'bring your own device'). It then may be useful to discuss approaches which aim to influence the user decision, while leaving end responsibility with the user. This is often referred to as nudging the user, or, more generally, as influencing human behavior. The main aim of this paper is to provide a generic formalization to facilitate rigorous quantitative analysis of influencing information security behavior, providing a theoretical basis for studying, optimizing, comparing and evaluating approaches. In particular, we propose an agent-based formalization that captures the human decision maker as well as the influencer and the relationship between them. Within this formalization we will characterize an optimal policy for influencing and formally prove that such policies are optimal. We then embed multi-criteria decision making into our formalism as an approach to model human behavior and to choose between alternatives. We apply our formalization by deriving optimal policies for the selection of WiFi networks, in which the graphical user interface aims to nudge the user to particular security behavior. © 2014 Newcastle University. Printed and published by Newcastle University, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details MORISSET, C., YEVSEYEVA, I., GROß, T., VAN MOORSEL, A. Formalization of Influencing in Information Security [By] C. Morisset, I. Yevseyeva, T. Groß, and A. van Moorsel Newcastle upon Tyne: Newcastle University: Computing Science, 2014. (Newcastle University, Computing Science, Technical Report Series, No. CS-TR-1423)
منابع مشابه
The Effect of IT on Organizational Structure (Case study: Refah bank in Guilan)
Undoubtedly, information technology (IT) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. Besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. It also pertains to appropriate information formulated...
متن کاملThe Effect of IT on Organizational Structure (Case study: Refah bank in Guilan)
Undoubtedly, information technology (IT) has undergone extensive developments in various social and economic spheres; its effect on human society is in such a way that the world today is referred as information society. Besides, information technology, attributed as the main agent of global change, is to achieve meta- organization purposes. It also pertains to appropriate information formulated...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملAnalysis of Factors Influencing Food Security Status of Female Headed Farm Households in Abia State, Nigeria
This study analysed factors influencing food security status of female headed farm households in Abia state, Nigeria. Multistage random sampling technique was employed in selecting 240 female headed farm households from whom data were collected using structured questionnaire. Data collected were analyzed using descriptive statistics, food security indices and probit regression technique. Result...
متن کاملIdentification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company
The purpose of this study is to identify and prioritize the effective technical and technical stress factors of information security by IT experts identified in Aghajari oil and gas Exploitation Company. The statistical population of the study consisted of 100 ICT managers and experts in Aghajari Oil and Gas Co. which directly related to the security of information in the company, 80 of them we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014