Abstract
The method for making information security effective within an organizations by analyzing the end user security behavior was described. Many information security specialists believe that promoting good end user behaviors and constraining bad end user behavior provide one important method for making information security effective within organizations. It was observed that good password hygiene was related to training, awareness, monitoring, and motivation. The results suggest that six categories of end user security-related behaviors appeared to fit well on a two-dimensional map where one dimension captured the level of technical knowledge needed to enact the behavior and another dimension captured the intentionality of the behavior.
Original language | English (US) |
---|---|
Pages (from-to) | 124-133 |
Number of pages | 10 |
Journal | Computers and Security |
Volume | 24 |
Issue number | 2 |
DOIs | |
State | Published - Mar 2005 |
Keywords
- Behavioral information security
- Computer security
- Organizational management
- Passwords
- Surveys
- User behavior
ASJC Scopus subject areas
- General Computer Science
- Law