Exploring Security Processes in Organizations: the Case of Smartphones
dc.contributor.author | Reinfelder, Lena | |
dc.contributor.author | Benenson, Zinaida | |
dc.contributor.editor | Burghardt, Manuel | |
dc.contributor.editor | Wimmer, Raphael | |
dc.contributor.editor | Wolff, Christian | |
dc.contributor.editor | Womser-Hacker, Christa | |
dc.date.accessioned | 2017-08-09T20:56:38Z | |
dc.date.available | 2017-08-09T20:56:38Z | |
dc.date.issued | 2017 | |
dc.description.abstract | We present results of two exploratory qualitative studies of smartphone security in organizations. The first study provides insights into the process of security development. The second study analyzes the effects of smartphone security measures on the productivity and behavior of end users. We find that smartphones create specific conflicts between security and productivity, because they have different technical characteristics and are used for different purposes than laptops and PCs. Nevertheless, security development processes for smartphones do not differ from other security processes, and the conflicts with productivity cannot be observed by security experts due to lack of structured feedback in organizations. Structured user involvement has a great potential to improve alignment of security processes with specific technologies and decrease negative effects of security measures on productivity. This, in turn, can increase the compliance behavior and consequently the organizational security level. | en |
dc.identifier.doi | 10.18420/muc2017-ws05-0403 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/3185 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Mensch und Computer 2017 - Workshopband | |
dc.relation.ispartofseries | Mensch und Computer | |
dc.title | Exploring Security Processes in Organizations: the Case of Smartphones | en |
dc.type | Text/Conference Paper | |
gi.citation.publisherPlace | Regensburg | |
gi.conference.date | 10.-13. September 2017 | |
gi.conference.location | Regensburg | |
gi.conference.sessiontitle | MCI-WS05: 3. Workshop Usable Security: Ziele der Usability und Security ausbalancieren | |
gi.document.quality | digidoc |
Dateien
Originalbündel
1 - 1 von 1