Blythe, John, Coventry, Lynne and Little, Linda (2015) Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). Usenix, Berkeley. ISBN 978-1-931971-249
|
Text
soups15-paper-blythe.pdf - Published Version Download (508kB) | Preview |
Abstract
The body of research that focuses on employees’ information Security Policy compliance is problematic as it treats compliance as a single behavior. This study explored the underlying behavioral context of information security in the workplace, exploring how individual and organizational factors influence the interplay of the motivations and barriers of security behaviors. Investigating factors that had previously been explored in security research, 20 employees from two organizations were interviewed and the data was analyzed using framework analysis. The analysis indicated that there were seven themes pertinent to information security: Response Evaluation, Threat Evaluation, Knowledge, Experience, Security Responsibility, Personal and Work Boundaries, and Security Behavior. The findings suggest that these differ by security behavior and by the nature of the behavior (e.g. on- and offline). Conclusions are discussed highlighting barriers to security actions and implications for future research and workplace practice.
Item Type: | Book Section |
---|---|
Subjects: | C800 Psychology G400 Computer Science |
Department: | Faculties > Health and Life Sciences > Psychology |
Depositing User: | Lynne Coventry |
Date Deposited: | 09 Dec 2016 14:34 |
Last Modified: | 01 Aug 2021 05:17 |
URI: | http://nrl.northumbria.ac.uk/id/eprint/28854 |
Downloads
Downloads per month over past year