Future directions for behavioral information security research

被引:435
作者
Crossler, Robert E. [1 ]
Johnston, Allen C. [2 ]
Lowry, Paul Benjamin [3 ]
Hu, Qing [4 ]
Warkentin, Merrill [1 ]
Baskerville, Richard [5 ]
机构
[1] Mississippi State Univ, Mississippi State, MS 39762 USA
[2] Univ Alabama Birmingham, Sch Business, Birmingham, AL 35294 USA
[3] City Univ Hong Kong, Dept Informat Syst, Kowloon Tong, Hong Kong, Peoples R China
[4] Iowa State Univ, Ames, IA 50011 USA
[5] Georgia State Univ, Atlanta, GA 30302 USA
关键词
Information security; Future research; Behavioral information security; Research challenges; Deviant security behavior; POLICY COMPLIANCE; SYSTEMS SECURITY; PROTECTION MOTIVATION; DECISION-MAKING; SOCIAL PRESENCE; DETERRENCE; THREAT; MODEL; OPPORTUNITIES; MANAGEMENT;
D O I
10.1016/j.cose.2012.09.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on technical issues. The purpose of this paper is to highlight future directions for Behavioral InfoSec research, which is a newer, growing area of research. The ensuing paper presents information about challenges currently faced and future directions that Behavioral InfoSec researchers should explore. These areas include separating insider deviant behavior from insider misbehavior, approaches to understanding hackers, improving information security compliance, cross-cultural Behavioral InfoSec research, and data collection and measurement issues in Behavioral InfoSec research. (c) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:90 / 101
页数:12
相关论文
共 106 条
[1]  
Acquisti A., 2004, Economics of Information Security, P165, DOI [DOI 10.1007/1-4020-8090-5_13.PDF, 10.1007/1-4020-8090-513, DOI 10.1007/1-4020-8090-5_13]
[2]  
Ajzen I., 2005, EBOOK: Attitudes, Personality and Behaviour
[3]  
Anderson B, 2012, D ROOD INF SEC WORKS
[4]  
Anderson CL, 2010, MIS QUART, V34, P613
[5]  
[Anonymous], 2013, MIS Q
[6]  
[Anonymous], GMUNDEN RETREAT NEUR
[7]  
Baker W., 2010, VERIZON 2010 DATA BR
[8]  
Barber R, 2001, COMPUT FRAUD SECUR, P14, DOI 10.1016/S1361-3723(01)02017-6
[9]  
Bossler A.M., 2011, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, P38
[10]  
Bulgurcu B, 2010, MIS QUART, V34, P523