How "What you think you know about cybersecurity" can help users make more secure decisions

被引:5
作者
Bahreini, Amir Fard [1 ]
Cavusoglu, Hasan
Cenfetelli, Ronald T.
机构
[1] Univ Wisconsin Whitewater, Coll Business & Econ, Dept Informat Technol & Supply Chain Management, Sauder Sch Business, 800W Main St, Whitewater, WI 53190 USA
关键词
Information security; Theory of bounded rationality; Objective security knowledge; Subjective security knowledge; Default settings; STATUS-QUO BIAS; SUBJECTIVE KNOWLEDGE; INFORMATION-TECHNOLOGY; FINANCIAL LITERACY; PRIVACY; JUDGMENT; RATIONALITY; PERCEPTIONS; BEHAVIORS; IMPACT;
D O I
10.1016/j.im.2023.103860
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of information technology artifacts in daily life makes security a shared responsibility of both users and companies. In recent years, increasing a user's objective (i.e., actual) security knowledge and providing applications with more secure default settings appear among the most ubiquitous tools companies use to broaden their efforts to help users make more secure decisions. Examining both solutions matters because they are widely used, cost effective, and understood by many security practitioners. Additionally, default settings and users' objective knowledge provide anchors for decision-making. However, human errors and insecure default settings are increasing and raising further questions about the efficacy of such efforts. Using the theory of bounded rationality, we investigated the role of objective, subjective (i.e., self-assessed) security knowledge, and default settings security level on the overall decision security. We found that objective security knowledge can lead to secure decisions when paired with high subjective security knowledge. In the absence of the latter, objective security knowledge is unable to lead to better security decisions. Furthermore, subjective security knowledge reduces the extent to which users fully accept default security settings, thereby mitigating bias toward insecure default settings.
引用
收藏
页数:14
相关论文
共 118 条
[1]  
Acquisti A, 2006, LECT NOTES COMPUT SC, V4258, P36
[2]   Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online [J].
Acquisti, Alessandro ;
Adjerid, Idris ;
Balebako, Rebecca ;
Brandimarte, Laura ;
Cranor, Lorrie Faith ;
Komanduri, Saranga ;
Giovanni Leon, Pedro ;
Sadeh, Norman ;
Schaub, Florian ;
Sleeper, Manya ;
Wang, Yang ;
Wilson, Shomir .
ACM COMPUTING SURVEYS, 2017, 50 (03)
[3]   Privacy and human behavior in the age of information [J].
Acquisti, Alessandro ;
Brandimarte, Laura ;
Loewenstein, George .
SCIENCE, 2015, 347 (6221) :509-514
[4]   The Impact of Relative Standards on the Propensity to Disclose [J].
Acquisti, Alessandro ;
John, Leslie K. ;
Loewenstein, George .
JOURNAL OF MARKETING RESEARCH, 2012, 49 (02) :160-174
[5]   Early to Adopt and Early to Discontinue: The Impact of Self-Perceived and Actual IT Knowledge on Technology Use Behaviors of End Users [J].
Aggarwal, Rohit ;
Kryscynski, David ;
Midha, Vishal ;
Singh, Harpreet .
INFORMATION SYSTEMS RESEARCH, 2015, 26 (01) :127-144
[6]  
Ahmed I, 2019, The 15 Biggest Data Breaches of the Last 15 Years
[7]   Knowledge calibration: What consumers know and what they think they know [J].
Alba, JW ;
Hutchinson, JW .
JOURNAL OF CONSUMER RESEARCH, 2000, 27 (02) :123-156
[8]   Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging [J].
Almuhimedi, Hazim ;
Schaub, Florian ;
Sadeh, Norman ;
Adjerid, Idris ;
Acquisti, Alessandro ;
Gluck, Joshua ;
Cranor, Lorrie ;
Agarwal, Yuvraj .
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, :787-796
[9]  
Ament C, 2017, ICIS 2017 P
[10]  
Anderson CL, 2010, MIS QUART, V34, P613