Criteria for a Personal Information Security Agent

被引:0
作者
Stieger, Ewald [1 ]
von Solms, Rossouw [1 ]
机构
[1] Nelson Mandela Metropolitan Univ, Port Elizabeth, South Africa
来源
PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2011年
关键词
Information security; information security awareness; persuasive technology; human computer interaction; human behaviour; USERS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Today's economy depends on the secure flow of information within and across organizations and information security is an issue of vital importance. Information security ensures business continuity and minimizes business damage by preventing and reducing the impact of security incidents. However, information security efforts are certainly not as effective as one would have wished for. A commonly accepted reason for this is the insecure behaviour of people. This insecure behaviour is often due to a lack of knowledge, awareness, education and training. In order to address this, many organisations provide security education, training and awareness programs to their employees. However, these programs often do not achieve a persistent change towards secure behaviour. The various reasons that contribute to the failure of security education, training and awareness programs and cause the trend towards insecure behaviour are briefly discussed. It follows that changing the behaviour of people is an inherently difficult task that requires the consideration of many factors. Similarly, a tool that intends to address insecure behaviour needs to consider various technological elements that may contribute in its ability to influence behaviour. The aim of this paper is to propose the principles of a personal information security agent and explore a set of objectives and criteria that may contribute to its success in influencing and reminding individuals towards a more secure behaviour. The criteria stem from various domains such as persuasive technology and human computer interaction. Persuasive technology has been applied in various domains to shape, reinforce or change people's behaviour. We describe related work that has been done using persuasive technology, and build on it. The proposed criteria consists of functions such as "To motivate" and characteristics such as "Context sensitivity". To put the theory into practice, a prototype of a personal security agent has been developed that implements some of the criteria. Based on this, a discussion on the development and implementation of the prototype and its potential benefits has been included. The prototype was developed to test the proposed criteria in a practical experiment that will form part of future research.
引用
收藏
页码:245 / 252
页数:8
相关论文
共 36 条
[1]   Users are not the enemy [J].
Adams, A ;
Sasse, MA .
COMMUNICATIONS OF THE ACM, 1999, 42 (12) :41-46
[2]   A qualitative study of users' view on information security [J].
Albrechtsen, Eirik .
COMPUTERS & SECURITY, 2007, 26 (04) :276-289
[3]  
[Anonymous], 1983, SOCIAL PSYCHOPHYSIOL
[4]  
[Anonymous], 2003, PERSUASIVE TECHNOLOG
[5]  
[Anonymous], 2005, P 11 INT C HUM COMP
[6]  
Arroyo E., 2005, P SIGCHI C HUM FACT, P639
[7]  
Austen J., 2008, 2008 ROYAL HOLLOWAY
[8]   The economics of user effort in information security [J].
Comput. Fraud Secur., 2009, 10 (8-12) :8-12
[9]   Toward an ethics of persuasive technology - Ask yourself whether your technology persuades users to do something you wouldn't want to be persuaded to do yourself. [J].
Berdichevsky, D ;
Neunschwander, E .
COMMUNICATIONS OF THE ACM, 1999, 42 (05) :51-58
[10]  
Cameron J., 2002, REWARDS INTRINSIC MO