The Role of Situation Awareness in Detecting Criminal Intrusions: A Different Perspective on Information Security Awareness

被引:0
作者
Hanus, Bartlomiej [1 ]
Wu, Yu Andy [1 ]
机构
[1] Univ North Texas, Denton, TX 76203 USA
来源
AMCIS 2012 PROCEEDINGS | 2012年
关键词
Cybercrime; intrusion detection systems; situation awareness; information processing; security awareness; POLICY COMPLIANCE; SYSTEMS; DETERRENCE; MEMORY; RISK;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Competent security administrators are needed for effective detection of incessant criminal intrusion attempts we witness nowadays. The required competence includes the ability to analyze a suspicious attempt with a high degree of awareness of the situation surrounding the attempt. However, the extant literature on information security awareness focuses on end-user education and overlooks the type that is critical for security administrators to perform their tasks. This paper presents a model about factors influencing detection of criminal intrusions, based on the military concept of situation awareness (SA). We argue that in using intrusion detection systems (IDSs) to deflect criminal intrusions, SA is critical because of the highly dynamic nature of the task at hand and the information processing capability it requires. We support our argument by explicating the roles of two foundational antecedents to SA - experience (as evidenced in the administrator's usage pattern of memory) and interface design (graphical versus command-line).
引用
收藏
页数:9
相关论文
共 42 条
[1]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[2]  
Atkinson Richard Chatham., 1968, Psychology of Learning and Motivation, V2, P89, DOI [10.1016/S0079-7421(08)60422-3, DOI 10.1016/S0079-7421(08)60422-3]
[3]   Working memory [J].
Baddeley, Alan .
CURRENT BIOLOGY, 2010, 20 (04) :R136-R140
[4]  
Boduroglu A., 2008, WORKING MEMORY HDB A, P55
[5]   If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security [J].
Boss, Scott R. ;
Kirsch, Laurie J. ;
Angermeier, Ingo ;
Shingler, Raymond A. ;
Boss, R. Wayne .
EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2009, 18 (02) :151-164
[6]  
Bulgurcu B, 2010, MIS QUART, V34, P523
[7]   Investigating sophisticated - Security breaches [J].
Casey, E .
COMMUNICATIONS OF THE ACM, 2006, 49 (02) :48-54
[9]  
Crossler R. E., 2010, 43 HAW INT C SYST SC
[10]   User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach [J].
D'Arcy, John ;
Hovav, Anat ;
Galletta, Dennis .
INFORMATION SYSTEMS RESEARCH, 2009, 20 (01) :79-98