How "What you think you know about cybersecurity" can help users make more secure decisions

被引:5
作者
Bahreini, Amir Fard [1 ]
Cavusoglu, Hasan
Cenfetelli, Ronald T.
机构
[1] Univ Wisconsin Whitewater, Coll Business & Econ, Dept Informat Technol & Supply Chain Management, Sauder Sch Business, 800W Main St, Whitewater, WI 53190 USA
关键词
Information security; Theory of bounded rationality; Objective security knowledge; Subjective security knowledge; Default settings; STATUS-QUO BIAS; SUBJECTIVE KNOWLEDGE; INFORMATION-TECHNOLOGY; FINANCIAL LITERACY; PRIVACY; JUDGMENT; RATIONALITY; PERCEPTIONS; BEHAVIORS; IMPACT;
D O I
10.1016/j.im.2023.103860
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of information technology artifacts in daily life makes security a shared responsibility of both users and companies. In recent years, increasing a user's objective (i.e., actual) security knowledge and providing applications with more secure default settings appear among the most ubiquitous tools companies use to broaden their efforts to help users make more secure decisions. Examining both solutions matters because they are widely used, cost effective, and understood by many security practitioners. Additionally, default settings and users' objective knowledge provide anchors for decision-making. However, human errors and insecure default settings are increasing and raising further questions about the efficacy of such efforts. Using the theory of bounded rationality, we investigated the role of objective, subjective (i.e., self-assessed) security knowledge, and default settings security level on the overall decision security. We found that objective security knowledge can lead to secure decisions when paired with high subjective security knowledge. In the absence of the latter, objective security knowledge is unable to lead to better security decisions. Furthermore, subjective security knowledge reduces the extent to which users fully accept default security settings, thereby mitigating bias toward insecure default settings.
引用
收藏
页数:14
相关论文
共 118 条
[71]  
Liang HG, 2009, MIS QUART, V33, P71
[72]   INFORMATION-PROCESSING AND BOUNDED RATIONALITY - A SURVEY [J].
LIPMAN, BL .
CANADIAN JOURNAL OF ECONOMICS-REVUE CANADIENNE D ECONOMIQUE, 1995, 28 (01) :42-67
[73]   Explainable Machine Learning for Default Privacy Setting Prediction [J].
Lobner, Sascha ;
Tesfay, Welderufael B. ;
Nakamura, Toru ;
Pape, Sebastian .
IEEE ACCESS, 2021, 9 :63700-63717
[74]   Baby Boomer retirement security: The roles of planning, financial literacy, and housing wealth [J].
Lusardi, Annamaria ;
Mitchell, Olivia S. .
JOURNAL OF MONETARY ECONOMICS, 2007, 54 (01) :205-224
[75]  
MacKenzie SB, 2011, MIS QUART, V35, P293
[76]   Subjective knowledge, search locations, and consumer choice [J].
Moorman, C ;
Diehl, K ;
Brinberg, D ;
Kidwell, B .
JOURNAL OF CONSUMER RESEARCH, 2004, 31 (03) :673-680
[77]  
Muncaster P, 2020, Over Half of Universities Suffered Data Breach in Past Year
[78]  
Nakamura Toru, 2016, ICISSP 2016. 2nd International Conference on Information Systems Security and Privacy. Proceedings, P53
[79]  
National Security Agency, 2018, Best Practices for Keeping Your Home Network Secure
[80]  
Newhouse W., 2017, National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework, DOI [DOI 10.6028/NIST.SP.800-181, 10.6028/NIST.SP.800-181]