The Design of Messages to Improve Cybersecurity Incident Reporting

被引:5
作者
Briggs, Pam [1 ]
Jeske, Debora [2 ]
Coventry, Lynne [1 ]
机构
[1] Northumbria Univ, Newcastle Upon Tyne, Tyne & Wear, England
[2] Univ Coll Cork, Cork, Ireland
来源
HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017) | 2017年 / 10292卷
基金
英国工程与自然科学研究理事会;
关键词
Security; User behavior; Incident reporting; Behavior change; Protection; motivation theory; Social loafing; PROTECTION MOTIVATION; TASKS;
D O I
10.1007/978-3-319-58460-7_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybersecurity suffers from the problem of poor incident reporting. We explored message influences on incident reporting rate. Participants were presented with messages that differed in terms of (i) whether the problem was framed as a technical or a security issue and (ii) the perceived beneficiaries of making a report (benefit to the user, to others vs. no benefit message). Participants were more likely to report a problem if so doing implied some benefit to self, where making the problem more personally relevant might act to reduce social loafing in group settings. They were also more likely to report a technical rather than a security problem and qualitative data suggested that users were sometimes suspicious of messages reporting a security incident - believing that the message itself might be a cybersecurity attack. The findings provide starting points for future research aimed at improving incident reporting.
引用
收藏
页码:3 / 13
页数:11
相关论文
共 47 条
[1]  
Akhawe Devdatta., 2013, Alice in warningland: A large-scale field study of browser security warning effectiveness, P257
[2]  
[Anonymous], P ACM WORKSH PRIV EL
[3]  
[Anonymous], 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, DOI 10.1145/2335356.2335360
[4]  
[Anonymous], 2008, P NEW SEC PAR WORKSH, DOI DOI 10.1145/1595676.1595684
[5]   The Influence of Software Process Maturity and Customer Error Reporting on Software Release and Pricing [J].
August, Terrence ;
Niculescu, Marius Florin .
MANAGEMENT SCIENCE, 2013, 59 (12) :2702-2726
[6]  
Bartsch Steffen., 2013, Trust and Trustworthy Computing, V7904, P205, DOI DOI 10.1007/978-3-642-38908-5_16
[7]  
Bauer L., 2013, Warning Design Guidelines
[8]  
Böhme R, 2011, PROCEEDINGS OF THE 2011 NEW SECURITY PARADIGMS WORKSHOP (NSPW'11), P67
[9]  
Bravo-Lillo C., 2013, P 9 S USABLE PRIVACY, P6, DOI [DOI 10.1145/2501604.2501610, 10.1145]
[10]  
Brustoloni J. C., 2007, S US PRIV SEC SOUPS