Information Security and Privacy (SIG SEC)

Loading...

Media is loading
 

Paper Type

ERF

Paper Number

1606

Description

Recent research has shown that IT use may be classified as either “continued use” that emphasizes efficiency or “novel use” that emphasizes innovation. Given these fundamental IT use types, this research seeks to understand which IT use type produces more secure behaviors in users. Using attention theory, we seek to understand secure behaviors from a purely user-completing-work-tasks approach instead of one of adherence to policy. A potential method for studying this phenomenon is given. Potential implications for research and practice are also shared.

Share

COinS
 
Aug 9th, 12:00 AM

Unintentional Insecure Behavior

Recent research has shown that IT use may be classified as either “continued use” that emphasizes efficiency or “novel use” that emphasizes innovation. Given these fundamental IT use types, this research seeks to understand which IT use type produces more secure behaviors in users. Using attention theory, we seek to understand secure behaviors from a purely user-completing-work-tasks approach instead of one of adherence to policy. A potential method for studying this phenomenon is given. Potential implications for research and practice are also shared.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.