Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Future directions for behavioral information security research

Published: 01 February 2013 Publication History

Abstract

Information Security (InfoSec) research is far reaching and includes many approaches to deal with protecting and mitigating threats to the information assets and technical resources available within computer based systems. Although a predominant weakness in properly securing information assets is the individual user within an organization, much of the focus of extant security research is on technical issues. The purpose of this paper is to highlight future directions for Behavioral InfoSec research, which is a newer, growing area of research. The ensuing paper presents information about challenges currently faced and future directions that Behavioral InfoSec researchers should explore. These areas include separating insider deviant behavior from insider misbehavior, approaches to understanding hackers, improving information security compliance, cross-cultural Behavioral InfoSec research, and data collection and measurement issues in Behavioral InfoSec research.

References

[1]
A. Acquisti, J. Grossklags, Privacy attitudes and privacy behavior, Economics of Information Security (2004) 165-178.
[2]
I. Ajzen, Attitudes, personality and behavior, Open Univ Press, New York, NY, 2005.
[3]
B. Anderson, J. Hansen, A. Vance, B. Kirwan, D. Eargle, L.J. Hinkle, Neural correlates of gender differences in distinguishing malware warnings and legitimate websites: a NeuroIS study, 2012.
[4]
C.L. Anderson, R. Agarwal, Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions, MIS Quarterly, 34 (2010) 613-643.
[5]
P.N. Ayuso, R.M. Gasca, L.F.T.-F.W. Lefevre, A cluster-based fault-tolerant architecture for stateful firewalls, Computers & Security, 31 (2012) 524-539.
[6]
W. Baker, M. Goudie, A. Hutton, C. Hylender, J. Niemantsverdriet, C. Novak, Verizon 2010 data breach investigations report, 2010. http://www.verizonbusiness.com/resources/reports/rp_2010-data-breach-report_en_xg.pdf
[7]
R. Barber, Hackers profiled - who are they and what are their motivations?, Computer Fraud & Security, 2001 (2001) 14-17.
[8]
A.M. Bossler, G.W. Burruss, The general theory of crime and computer hacking: low self-control hackers?, in: Corporate hacking and technology-driven crime: social dynamics and implications, Hershey: Information Science Reference, 2011, pp. 38-67.
[9]
B. Bulgurcu, H. Cavusoglu, I. Benbasat, Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness, MIS Quarterly, 34 (2010) 523-548.
[10]
K.-K.R. Choo, The cyber threat landscape: challenges and future research directions, Computers & Security, 30 (2011) 719-731.
[11]
L.E. Cohen, M. Felson, Social change and crime rate trends: a routine activity approach, American Sociological Review, 44 (1979) 588-608.
[12]
R.E. Crossler, Protection motivation theory: understanding determinants to backing up personal data, 2010.
[13]
J. D'Arcy, A. Hovav, D. Galletta, User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach, Information Systems Research, 20 (2009) 79-98.
[14]
J. D'Arcy, T. Herath, A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings, European Journal of Information Systems, 20 (2011) 643-658.
[15]
J. D'Arcy, A. Hovav, Deterring internal information systems misuse, Communications of the ACM, 50 (2007) 113-117.
[16]
A. Dimoka, What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study, MIS Quarterly, 34 (2010) 373-396.
[17]
A. Dimoka, How to conduct a functional magnetic resonance (fMRI) study in social science research, MIS Quarterly, 36 (2012) 811-840.
[18]
A. Dimoka, R.D. Banker, I. Benbasat, F.D. Davis, A.R. Dennis, D. Gefen, On the use of neurophysiological tools in information systems research: developing a research agenda for NeuroIS, MIS Quarterly, 36 (2012) 679-702.
[19]
M.T. Dlamini, J.H.P. Eloff, M.M. Eloff, Information security: the moving target, Computers & Security, 28 (2009) 189-198.
[20]
M. Douglas, Risk and blame: essays in cultural theory, Routledge, New York, 1992.
[21]
K.M. Eisenhardt, M.E. Graebner, Theory building from cases: opportunities and challenges, The Academy of Management Journal Archive, 50 (2007) 25-32.
[22]
I.J. Fagnot, Behavioral information security, in: Encyclopedia of cyber warfare and cyber terrorism, USA: Information Science Reference, Hershey, PA, 2008, pp. 199-205.
[23]
B.G. Glaser, A.L. Strauss, The discovery of grounded theory: strategies of qualitative research, Wledenfeld and Nicholson, London, 1967.
[24]
K.H. Guo, Y. Yuan, N.P. Archer, C.E. Connelly, Understanding nonmalicious security violations in the workplace: a composite behavior model, Journal of Management Information Systems, 28 (2011) 203-236.
[25]
D. Halbert, Discourses of danger and the computer hacker, The Information Society, 13 (1997) 361-374.
[26]
J.V. Hansen, P.B. Lowry, R. Meservy, D. McDonald, Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection, Decision Support Systems, 43 (2007) 1362-1374.
[27]
T. Herath, H. Rao, Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness, Decision Support Systems, 47 (2009) 154-165.
[28]
T. Herath, H. Rao, Protection motivation and deterrence: a framework for security policy compliance in organisations, European Journal of Information Systems, 18 (2009) 106-125.
[29]
S.M. Ho, N. McDonald, M. Warkentin, Lie to me: gender deception and detection in computer-mediated communications, 2012.
[30]
G. Hofstede, Culture's consequences: comparing values, behaviors, institutions, and organizations across nations, Sage Publications, Inc, 2001.
[31]
R.C. Hollinger, Hackers: computer heroes or electronic highwaymen?, ACM SIGCAS Computers and Society, 21 (1991) 6-17.
[32]
Q. Hu, T. Dinev, P. Hart, D. Cooke, Managing employee compliance with information security policies: the role of top management and organizational culture, Decision Sciences, 43 (2012) 615-660.
[33]
Q. Hu, Z. Xu, T. Dinev, H. Ling, Does deterrence work in reducing information security policy abuse by employees?, Communications of the ACM, 54 (2011) 54-60.
[34]
Q. Hu, C. Zhang, Z. Xu, How can you tell a hacker from a geek? Ask whether he spends more time on computer games than sports!, 2011.
[35]
P. Ifinedo, Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory, Computers & Security, 31 (2012) 83-95.
[36]
M.L. Jensen, P.B. Lowry, J.K. Burgoon, J.F. Nunamaker, Technology dominance in complex decision making: the case of aided credibility assessment, Journal of Management Information Systems, 27 (2010) 175-202.
[37]
M.L. Jensen, P.B. Lowry, J.L. Jenkins, Effects of automated and participative decision support in computer-aided credibility assessment, Journal of Management Information Systems, 28 (2011) 201-234.
[38]
A.C. Johnston, M. Warkentin, Fear appeals and information security behaviors: an empirical study, MIS Quarterly, 34 (2010) 549-566.
[39]
S.S. Kim, N.K. Malhotra, A longitudinal model of continued IS use: an integrative view of four mechanisms underlying postadoption phenomena, Management Science, 51 (2005) 741-755.
[40]
W. Kuechler, V. Vaishnavi, A framework for theory development in design science research: multiple perspectives, Journal of the Association for Information Systems, 13 (2012) 395-423.
[41]
J. Leach, Improving user security behaviour, Computers & Security, 22 (2003) 685-692.
[42]
S.M. Lee, S.G. Lee, S. Yoo, An integrative model of computer abuse based on social control and general deterrence theories, Information & Management, 41 (2004) 707-718.
[43]
Y. Lee, Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective, Decision Support Systems, 50 (2011) 361-369.
[44]
Y. Lee, K.R. Larsen, Threat or coping appraisal: determinants of SMB executive's decision to adopt anti-malware software, European Journal of Information Systems, 18 (2009) 177-187.
[45]
T.R. Levine, K.J.K. Asada, L.L.M. Lindsey, The relative impact of violation type and lie severity on judgments of message deceitfulness, Communication Research Reports, 20 (2003) 208-218.
[46]
S. Levy, Hackers: heroes of the computer revolution, Penguin Books, New York, NY, 2001.
[47]
H. Liang, Y. Xue, Understanding security behaviors in personal computer usage: a threat avoidance perspective, Journal of the Association for Information Systems, 11 (2010) 394-413.
[48]
P.B. Lowry, J. Cao, A. Everard, Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: the case of instant messaging in two cultures, Journal of Management Information Systems, 27 (2011) 165-204.
[49]
P.B. Lowry, D. Zhang, L. Zhou, X. Fu, Effects of culture, social presence, and group composition on trust in technology-supported decision-making groups, Information Systems Journal, 20 (2010) 297-315.
[50]
M.A. Mahmood, M. Siponen, D. Straub, H.R. Rao, T. Raghu, Moving toward black hat research in information systems security: an editorial introduction to the special issue, MIS Quarterly, 34 (2010) 431-433.
[51]
S.A. McCornack, Information manipulation theory, Communication Monographs, 59 (1992) 1-16.
[52]
S.A. McCornack, T.R. Levine, K.A. Solowczuk, H.I. Torres, D.M. Campbell, When the alteration of information is viewed as deception: an empirical test of information manipulation theory, Communication Monographs, 59 (1992) 17-29.
[53]
M.D. Myers, M. Newman, The qualitative interview in IS research: examining the craft, Information and Organization, 17 (2007) 2-26.
[54]
L. Myyry, M. Siponen, S. Pahnila, T. Vartiainen, A. Vance, What levels of moral reasoning and values explain adherence to information security rules an empirical study, European Journal of Information Systems, 18 (2009) 126-139.
[55]
A. Nicholson, S. Webber, S. Dyer, T. Patel, H. Janicke, SCADA security in the light of cyber-warfare, Computers & Security, 31 (2012) 418-436.
[56]
D. Ormond, M. Warkentin, Message quality and quantity manipulations and their effects on perceived risk, in: Proceedings of the national decision sciences institute (DSI) annual conference San Francisco, 2012.
[57]
G. Pogarsky, Projected offending and contemporaneous rule-violation: implications for heterotypic continuity, Criminology, 42 (2004) 111-136.
[58]
C. Posey, R. Bennett, T.L. Roberts, P.B. Lowry, When computer monitoring backfires: invasion of privacy and organizational injustice as precursors to computer abuse, Journal of Information System Security, 7 (2011) 24-47.
[59]
C. Posey, R.J. Bennett, T.L. Roberts, Understanding the mindset of the abusive insider: an examination of insiders' causal reasoning following internal security changes, Computers & Security, 30 (2011) 486-497.
[60]
C. Posey, P.B. Lowry, T.L. Roberts, S. Ellis, The culture-influenced online community self-disclosure model: the case of working professionals in France and the UK who use online communities, European Journal of Information Systems, 19 (2010) 181-195.
[61]
C. Posey, T.L. Roberts, P.B. Lowry, Motivating the insider to protect organizational information assets: evidence from protection motivation theory and rival explanations, 2011.
[62]
R. Richardson, 2010/2011 CSI computer crime and security survey, 2011. http://www.GoCSI.com
[63]
Roberts CC. Plan-based simulation of malicious intruders on a computer system. Masters Thesis. Monteray, CA: Naval Postgraduate School; 1995.
[64]
M. Rogers, N.D. Smoak, J. Liu, Self-reported deviant computer behavior: a big-5, moral choice, and manipulative exploitive behavior analysis, Deviant Behavior, 27 (2006) 245-268.
[65]
M.K. Rogers, K. Seigfried, K. Tidke, Self-reported computer criminal behavior: a psychological analysis, Digital Investigation, 3 (2006) 116-120.
[66]
R.W. Rogers, Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation, in: Social psychophysiology: a sourcebook, Guilford, New York, NY, USA, 1983, pp. 153-176.
[67]
M.A. Sasse, S. Brostoff, D. Weirich, Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security, BT Technology Journal, 19 (2001) 122-131.
[68]
B.H. Schell, J.L. Dodge, S.S. Moutsatsos, The hacking of America: who's doing it, why, and how, Quorum Books, 2002.
[69]
M. Siponen, A. Vance, Neutralization: new insights into the problem of employee information systems security policy violations, MIS Quarterly, 34 (2010) 487-502.
[70]
M. Siponen, R. Willison, A critical assessment of IS security research between 1990-2004, in: 15th European conference on information systems. St. Gallen, Switzerland, 2007, pp. 1551-1559.
[71]
M. Siponen, R. Willison, Information security management standards: problems and solutions, Information & Management, 46 (2009) 267-270.
[72]
M. Srite, E. Karahanna, The role of espoused national cultural values in technology acceptance, MIS Quarterly, 30 (2006) 679-704.
[73]
J.M. Stanton, K.R. Stam, P. Mastrangelo, J. Jolton, Analysis of end user security behaviors, Computers & Security, 24 (2005) 124-133.
[74]
J.M. Stanton, K.R. Stam, P.M. Mastrangelo, J.A. Jolton, Behavioral information security: an overview, results, and research agenda, in: Human-computer interaction and management information systems: foundations, M.E. Sharpe, Armonk, NY, USA, 2006, pp. 262-280.
[75]
D. Straub, M. Limayem, E. Karahanna-Evaristo, Measuring system usage: implications for IS theory testing, Management Science, 41 (1995) 1328-1342.
[76]
D.W. Straub, Black hat, white hat studies in information security, 2009.
[77]
D.W. Straub, W.D. Nance, Discovering and disciplining computer abuse in organization, MIS Quarterly, 14 (1990) 45.
[78]
D.W. Straub, R.J. Welke, Coping with systems risk: security planning models for management decision making, MIS Quarterly, 22 (1998) 441-469.
[79]
P. Taylor, Hackers: crime in the digital sublime, Routledge, London, 1999.
[80]
M. Theoharidou, S. Kokolakis, M. Karyda, E. Kiountouzis, The insider threat to information systems and the effectiveness of ISO17799, Computers & Security, 24 (2005) 472-484.
[81]
A. Vance, B. Molyneux, P.B. Lowry, A new approach to the problem of unauthorized access: raising perceptions of accountability through user interface design features, 2011.
[82]
A. Vance, B. Molyneux, P.B. Lowry, Reducing unauthorized access by insiders through end-user design: making users accountable, in: 45th Annual Hawaii international conference on system sciences (HICSS). Maui, Hawaii, USA, 2012.
[83]
A. Vance, K. Ouimet, D. Eargle, Enhancing password security through interactive fear appeals, 2012.
[84]
V. Venkatesh, F.D. Davis, A theoretical extension of the technology acceptance model: four longitudinal field studies, Management Science, 46 (2000) 186-204.
[85]
C. Vroom, R. von Solms, Towards information security behavioural compliance, Computers & Security, 23 (2004) 191-198.
[86]
G. Walsham, Are we making a better world with ICTs? Reflections on a future agenda for the IS field, Journal of Information Technology, 27 (2012) 87-93.
[87]
M. Warkentin, A.C. Johnston, J. Shropshire, The influence of the informal social learning environment on information privacy policy compliance efficacy and intention, European Journal of Information Systems, 20 (2011) 267-284.
[88]
M. Warkentin, J. Shropshire, A.C. Johnston, Security software discontinuance, 2006.
[89]
M. Warkentin, D. Straub, K. Malimage, Measuring the dependent variable for research into secure behaviors, 2011.
[90]
M. Warkentin, D. Straub, K. Malimage, Measuring secure behavior: a research commentary, in: Proceedings of the annual symposium on information assurance. Albany, New York, 2012.
[91]
M. Warkentin, E.A. Walden, A.C. Johnston, D.W. Straub, Identifying the neural correlates of protection motivation for secure IT behaviors, Gmunden Retreat on NeuroIS, 2012 (2012).
[92]
M. Warkentin, R. Willison, Behavioral and policy issues in information systems security: the insider threat, European Journal of Information Systems, 18 (2009) 101-105.
[93]
P.O. Wikström, Crime as alternative: towards a cross-level situational action theory of crime causation, in: Beyond empiricism: institutions and intentions in the study of crime, Transaction Publishers, New Brunswick, NJ, 2004, pp. 1-38.
[94]
P.O. Wikström, Linking individual, setting, and acts of crime. situational mechanisms and the explanation of crime, in: The explanation of crime: contexts, mechanisms, and development, Cambridge University Press, Cambridge, UK, 2006.
[95]
R. Willison, Understanding the perpetration of employee computer crime in the organisational context, Information and Organization, 16 (2006) 304-324.
[96]
R. Willison, J. Backhouse, Opportunities for computer crime: considering systems risk from a criminological perspective, European Journal of Information Systems, 15 (2006) 403-414.
[97]
Willison R, Warkentin M. Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly; 2013;37(1).
[98]
I.M.Y. Woon, G.W. Tan, R.T. Low, A protection motivation theory approach to home wireless security, in: Twenty-sixth international conference on information systems (ICIS), 2005, pp. 367-380.
[99]
R.T. Wright, K. Marett, The influence of experiential and dispositional factors in phishing: an empirical investigation of the deceived, Journal of Management Information Systems, 27 (2010) 273-303.
[100]
M. Yar, Computer hacking: just another case of juvenile delinquency?, The Howard Journal of Criminal Justice, 44 (2005) 387-399.
[101]
R.K. Yin, Case study research: design and methods, Sage Publications, Newbury Park, CA, 2009.
[102]
R. Young, L. Zhang, V.R. Prybutok, Hacking into the minds of hackers, Information Systems Management, 24 (2007) 281-287.
[103]
H. Zafar, J.G. Clark, Current state of information security research in IS, Communications of the Association for Information Systems, 24 (2009) 557-596.
[104]
D. Zhang, P.B. Lowry, Issues, limitations, and opportunities in cross-cultural research on collaborative software in information systems, Journal of Global Information Management, 16 (2008) 61-92.
[105]
D. Zhang, P.B. Lowry, L. Zhou, X. Fu, The impact of individualism-collectivism, social presence, and group diversity on group decision making under majority influence, Journal of Management Information Systems, 23 (2007) 53-80.
[106]
W. Zhi-jun, Z. Hai-tao, W. Ming-hua, P. Bao-song, MSABMS-based approach of detecting LDoS attack, Computers & Security, 31 (2012) 402-417.

Cited By

View all
  • (2024)Explicating Geo-Tagging Behavior on Social Media: Role of Interpersonal Competence, Self-Regulation, Online Affiliation, and Privacy CalculusACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3645057.364506055:1(12-34)Online publication date: 6-Feb-2024
  • (2023)Going Beyond DeterrenceInformation Systems Research10.1287/isre.2022.113334:1(342-362)Online publication date: 1-Mar-2023
  • (2021)Machine Learning and Survey-based Predictors of InfoSec Non-ComplianceACM Transactions on Management Information Systems10.1145/346668913:2(1-20)Online publication date: 18-Oct-2021
  • Show More Cited By

Index Terms

  1. Future directions for behavioral information security research
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Computers and Security
      Computers and Security  Volume 32, Issue C
      February 2013
      273 pages

      Publisher

      Elsevier Advanced Technology Publications

      United Kingdom

      Publication History

      Published: 01 February 2013

      Author Tags

      1. Behavioral information security
      2. Deviant security behavior
      3. Future research
      4. Information security
      5. Research challenges

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Explicating Geo-Tagging Behavior on Social Media: Role of Interpersonal Competence, Self-Regulation, Online Affiliation, and Privacy CalculusACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3645057.364506055:1(12-34)Online publication date: 6-Feb-2024
      • (2023)Going Beyond DeterrenceInformation Systems Research10.1287/isre.2022.113334:1(342-362)Online publication date: 1-Mar-2023
      • (2021)Machine Learning and Survey-based Predictors of InfoSec Non-ComplianceACM Transactions on Management Information Systems10.1145/346668913:2(1-20)Online publication date: 18-Oct-2021
      • (2021)Integrating Security Behavior into Attack SimulationsProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470475(1-13)Online publication date: 17-Aug-2021
      • (2021)Protection Motivation Theory in Information Systems Security ResearchACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3462766.346277052:2(25-67)Online publication date: 28-Apr-2021
      • (2021)Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control ProceduresACM Transactions on Management Information Systems10.1145/342428212:2(1-29)Online publication date: 3-Feb-2021
      • (2020)The Influence of Professional Subculture on Information Security Policy ViolationsInformation Systems Research10.1287/isre.2020.094131:4(1240-1259)Online publication date: 1-Dec-2020
      • (2020)Don’t click: towards an effective anti-phishing training. A comparative literature reviewHuman-centric Computing and Information Sciences10.1186/s13673-020-00237-710:1Online publication date: 9-Aug-2020
      • (2019)Seeing the forest and the treesMIS Quarterly10.25300/MISQ/2019/1511743:2(525-554)Online publication date: 1-Jun-2019
      • (2019)Security OrganizingACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3371041.337104450:4(14-27)Online publication date: 1-Nov-2019
      • Show More Cited By

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media