Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Socio-Technical Aspects in Security and Trust(2013)

引用 4|浏览0
暂无评分
摘要
Information security policies are used to mitigate threats for which a technical prevention is not feasible. Compliance with information security policies is a notoriously difficult issue. Social sciences could provide tools to empirically study compliance with policies. We use a variation of the lost-letter technique to study IT risk behaviour, using USB keys instead of letters. The observational lost-letter study by Farrington and Knight (1979) was replicated in a university setting by dropping 106 USB keys. Labels on the USB keys were used to vary characteristics of the alleged victim. Observers noted characteristics of people who picked a USB key up and whether the USB key was returned. Results show that USB keys in their original box are stolen more than used ones and that people aged 30 or younger and those who place a found USB key in their pocket are more likely to steal. This suggests that the decision to steal a USB key is taken at the moment of pick up, despite ample opportunity to return it. The lost USB key technique proved to be a feasible method of data collection to measure policy compliance and thus also risk behaviour.
更多
查看译文
关键词
information security policy,alleged victim,lost-letter technique,feasible method,policy compliance,it risk behaviour,study compliance,observational lost-letter study,lost usb key technique,assess it risk behaviour,usb key,predictive models,data acquisition,psychology,data collection,information security,social sciences,risk analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要