Introduction to Measuring and Evaluating Security Compliance

When studying cybersecurity behaviors, it’s essential to understand the human-computer interaction (HCI) involved. Many critical security tasks—like password management, user authentication, patch management, and data sharing—require users to interact with security technologies. Understanding these interactions is crucial for designing effective security measures and ensuring compliance.

Focus of the Week: This week, the focus is on how HCI can influence behavior change, particularly in the context of cybersecurity compliance. The study of compliance behavior examines how individuals make decisions when interacting with security technologies and how these decisions impact their compliance with security protocols.

Key Paper: The paper “Cybersecurity Compliance Behavior: Exploring the Influences of Individual Decision Style and Other Antecedents” by Donalds and Osei-Bryson (2020) is a significant resource for understanding these dynamics. This research explores how an individual’s decision-making style and other factors influence their cybersecurity compliance behavior. It provides insights into how people interact with security technologies and what drives their compliance or non-compliance.

Topics Covered in the Paper:

  • The role of individual decision-making styles in security compliance.
  • How various antecedents, such as organizational culture, perceived risk, and personal attitudes, influence compliance behavior.
  • The implications of these findings for designing security technologies and policies that promote better compliance.

Practical Application: Understanding these factors can help security practitioners design systems and policies that are more aligned with user behavior, leading to higher compliance rates and more secure environments.

Further Reading: For a detailed analysis, you can find the paper in the International Journal of Information Management, Volume 51, 2020, page 102056. Access it through the Online Library to explore the research findings in-depth.

Leave a Comment

Your email address will not be published. Required fields are marked *