289,457 research outputs found

    Factors Affecting Employee Intentions to Comply With Password Policies

    Get PDF
    Password policy compliance is a vital component of organizational information security. Although many organizations make substantial investments in information security, employee-related security breaches are prevalent, with many breaches being caused by negative password behavior such as password sharing and the use of weak passwords. The purpose of this quantitative correlational study was to examine the relationship between employees’ attitudes towards password policies, information security awareness, password self-efficacy, and employee intentions to comply with password policies. This study was grounded in the theory of planned behavior and social cognitive theory. A cross-sectional survey was administered online to a random sample of 187 employees selected from a pool of qualified Qualtrics panel members. Participants worked for organizations in the United States and were aware of the password policies in their own organizations. The collected data were analyzed using 3 ordinal logistic regression models, each representing a specific measure of employees’ compliance intentions. Attitudes towards policies and password self-efficacy were significant predictors of employees’ intentions to comply with password policies (odds ratios ≥ 1.257, p \u3c .05), while information security awareness did not have a significant impact on compliance intentions. With more knowledge of the controllable predictive factors affecting compliance, information security managers may be able to improve password policy compliance and reduce economic loss due to related security breaches. An implication of this study for positive social change is that a reduction in security breaches may promote more public confidence in organizational information systems

    The Complex Pathway towards Farm-Level Sustainable Intensification: An Exploratory Network Analysis of Stakeholders’ Knowledge and Perception

    Get PDF
    peer-reviewedFarm-level sustainable intensification of agriculture (SIA) has become an important concept to ensuring food security while minimising negative externalities. However, progress towards its achievement is often constrained by the different perceptions and goals of various stakeholders that affect farm management decisions. This study examines farm-level SIA as a dynamic system with interactive components that are determined by the interests of the stakeholders involved. A systems thinking approach was used to identify and describe the pathways towards farm-level SIA across the three main pillars of sustainability. An explanatory network analysis of fuzzy cognitive maps (FCMs) that were collectively created by representative groups of farmers, farm advisors and policy makers was performed. The study shows that SIA is a complex dynamic system, affected by cognitive beliefs and particular knowledge within stakeholder groups. The study concludes that, although farm-level SIA is a complex process, common goals can be identified in collective decision making

    Autonomic computing architecture for SCADA cyber security

    Get PDF
    Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term ‘Autonomic Computing’ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator

    Modeling inertia causatives:validating in the password manager adoption context

    Get PDF
    Cyber criminals are benefiting from the fact that people do not take the required precautions to protect their devices and communications. It is the equivalent of leaving their home’s front door unlocked and unguarded, something no one would do. Many efforts are made by governments and other bodies to raise awareness, but this often seems to fall on deaf ears. People seem to resist changing their existing cyber security practices: they demonstrate inertia. Here, we propose a model and instrument for investigating the factors that contribute towards this phenomenon
    • …
    corecore