Logo des Repositoriums
 

On the possible impact of security technology design on policy adherent user behavior - Results from a controlled empirical experiment

dc.contributor.authorKurowski, Sebastian
dc.contributor.authorFähnrich, Nicolas
dc.contributor.authorRoßnagel, Heiko
dc.contributor.editorLangweg, Hanno
dc.contributor.editorMeier, Michael
dc.contributor.editorWitt, Bernhard C.
dc.contributor.editorReinhardt, Delphine
dc.date.accessioned2018-03-22T12:40:39Z
dc.date.available2018-03-22T12:40:39Z
dc.date.issued2018
dc.description.abstractThis contribution provides results from a controlled experiment on policy compliance in work environments with restrictive security technologies. The experimental setting involved subjects forming groups and required them to solve complex and creative tasks for virtual customers under increasing time pressure, while frustration and work impediment of the used security technology were measured. All subjects were briefed regarding existing security policies in the experiment setting, and the consequences of violating these policies, as well as the consequences for late delivery or failure to meet the quality criteria of the virtual customer. Policy breaches were observed late in the experiment, when time pressure was peaking. Subjects not only indicated maximum frustration, but also a strong and significant correlation (.765, p<.01) with work impediment caused by the security technology. This could indicate that user-centred design does not only contribute to the acceptance of a security technology, but may also be able to positively influence practical information security as a whole.en
dc.identifier.doi10.18420/sicherheit2018_11
dc.identifier.isbn978-3-88579-675-6
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/16276
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSICHERHEIT 2018
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-281
dc.subjectPolicy Compliance
dc.subjectTechnology Acceptance
dc.subjectTask Technology Fit
dc.subjectInformation Security
dc.subjectDue Care
dc.titleOn the possible impact of security technology design on policy adherent user behavior - Results from a controlled empirical experimenten
dc.typeText/Conference Paper
gi.citation.endPage158
gi.citation.publisherPlaceBonn
gi.citation.startPage145
gi.conference.date25.-27. April 2018
gi.conference.locationKonstanz, Germany
gi.conference.sessiontitleWissenschaftliche Beiträge

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
sicherheit2018-11.pdf
Größe:
867.35 KB
Format:
Adobe Portable Document Format