International Journal of Information Systems and Project Management
In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.
Yevseyeva, Iryna; Turland, James; Morisset, Charles; and Coventry, Lynne
"Addressing consumerization of IT risks with nudging,"
International Journal of Information Systems and Project Management: Vol. 3:
3, Article 2.
Available at: https://aisel.aisnet.org/ijispm/vol3/iss3/2