70 likes | 134 Views
Behavioral/Experimental Research on Information Security: Opportunities for AIS Researchers. Paul John Steinbart Arizona State University IS Section Midyear Meeting Scottsdale, AZ January 6, 2006.
E N D
Behavioral/Experimental Research on Information Security: Opportunities for AIS Researchers Paul John Steinbart Arizona State University IS Section Midyear Meeting Scottsdale, AZ January 6, 2006 IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006
Why do we need behavioral research on information security? Becausepeople are the key piece of the information security puzzle Policy People Procedures Products IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006
Behavioral/experimental research on information security is needed because • The history of IT is full of stories about technically superior products/systems that were implementation failures. Therefore … • Need to research effect of HUMAN FACTORS on information security effectiveness • Individual level • Cognitive limitations • User attitudes • Organizational level • Politics • System implementation IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006
An example: Passphrases versus passwords • Ease of use? • What kinds of problems occur? • User attitudes? IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006
Two major focal groups to study • Management • What factors influence top management’s attitude toward investing in information security? • How can management most effectively increase information security? • Employees – both end users and security professionals • Usability? • Attitudes? IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006
Why AIS researchers should do behavioral research on information security • Training • Knowledge/understanding of internal control • Access to data • “Fit” with what we teach • Opportunity to contribute to IS discipline IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006
The bottom line:Behavioral/experimental research is necessary in order to truly understand information security • Just because an exploit is possible does not mean it is probable • Just because a new information security policy/procedure/product is “stronger” does not mean that it can be implemented effectively IS Section Midyear Meeting Scottsdale, AZ – January 6, 2006