Information Security and Privacy (SIG SEC)
Loading...
Paper Type
ERF
Paper Number
1606
Description
Recent research has shown that IT use may be classified as either “continued use” that emphasizes efficiency or “novel use” that emphasizes innovation. Given these fundamental IT use types, this research seeks to understand which IT use type produces more secure behaviors in users. Using attention theory, we seek to understand secure behaviors from a purely user-completing-work-tasks approach instead of one of adherence to policy. A potential method for studying this phenomenon is given. Potential implications for research and practice are also shared.
Recommended Citation
Williams, Jason and Gupta, Saurabh, "Unintentional Insecure Behavior" (2021). AMCIS 2021 Proceedings. 21.
https://aisel.aisnet.org/amcis2021/info_security/info_security/21
Unintentional Insecure Behavior
Recent research has shown that IT use may be classified as either “continued use” that emphasizes efficiency or “novel use” that emphasizes innovation. Given these fundamental IT use types, this research seeks to understand which IT use type produces more secure behaviors in users. Using attention theory, we seek to understand secure behaviors from a purely user-completing-work-tasks approach instead of one of adherence to policy. A potential method for studying this phenomenon is given. Potential implications for research and practice are also shared.
When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.