Security Circumvention: To Educate or To Enforce?

dc.contributor.authorDey, Debabrata
dc.contributor.authorGhoshal, Abhijeet
dc.contributor.authorLahiri, Atanu
dc.date.accessioned2017-12-28T02:13:49Z
dc.date.available2017-12-28T02:13:49Z
dc.date.issued2018-01-03
dc.description.abstractDeliberate circumvention of information systems security is a common behavioral pattern among users. It not only defeats the purpose of having the security controls in place, but can also go far beyond in terms of the total damage it can cause. An organization grappling with circumvention can try to (i) train its users, or (ii) take on enforcement measures, or adopt a combination of the two. In this work, we look at the trade-off between these two very different approaches towards circumvention and try to gain some insights about how an organization might wish to tackle this menace.
dc.format.extent10 pages
dc.identifier.doi10.24251/HICSS.2018.648
dc.identifier.isbn978-0-9981331-1-9
dc.identifier.urihttp://hdl.handle.net/10125/50537
dc.language.isoeng
dc.relation.ispartofProceedings of the 51st Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectStrategy, Information, Technology, Economics, and Society (SITES)
dc.subjectCircumvention, IT Security, monitoring, security control, training, work-around
dc.titleSecurity Circumvention: To Educate or To Enforce?
dc.typeConference Paper
dc.type.dcmiText

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
paper0650.pdf
Size:
1.19 MB
Format:
Adobe Portable Document Format