Persuasive Information Security. A Behavior Change Support System to Help Employees Protect Organizational Information Security

Marc Busch (Vortragende:r), Sameer Patil, Georg Regal, Christina Hochleitner, Peter Fröhlich, Manfred Tscheligi

Publikation: Beitrag in Buch oder TagungsbandVortrag mit Beitrag in TagungsbandBegutachtung

Abstract

Digital information is an important asset in the corporate world. Organizations typically devise policies and guidelines to help employees protect the security of such information. Complying with these policies can often be confusing and difficult and may obstruct the task at hand, thus potentially leading employees to circumvent or ignore these policies. Commercial technology and training programs to mitigate this issue suffer from various shortcomings. To overcome these limitations, we present a Behavior Change Support prototype that implements six persuasive features: Security Points, Security Quiz, Challenges, Statistics, Personalization, and Risk Communication. Evaluation of the prototype established persuasive security as a promising approach for influencing user attitudes and behaviors regarding secure work practices. We apply the findings to offer suggestions for how the six persuasive features could be further enhanced.
OriginalspracheEnglisch
TitelProceedings of the Third International Workshop on Behavior Change Support Systems co-located with the 10th International Conference on Persuasive Technology (PERSUASIVE 2015)
Seitenumfang11
PublikationsstatusVeröffentlicht - 2015
VeranstaltungThird International Workshop on Behavior Change Support Systems -
Dauer: 3 Juni 20155 Juni 2015

Konferenz

KonferenzThird International Workshop on Behavior Change Support Systems
Zeitraum3/06/155/06/15

Research Field

  • Ehemaliges Research Field - Technology Experience

Fingerprint

Untersuchen Sie die Forschungsthemen von „Persuasive Information Security. A Behavior Change Support System to Help Employees Protect Organizational Information Security“. Zusammen bilden sie einen einzigartigen Fingerprint.

Diese Publikation zitieren