A decision making model of influencing behavior in information security

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Information security decisions typically involve a trade-off between security and productivity. In practical settings, it is often the human user who is best positioned to make this trade-off decision, or in fact has a right to make its own decision (such as in the case of 'bring your own device'), although it may be responsibility of a company security manager to influence employees choices. One of the practical ways to model human decision making is with multi-criteria decision analysis, which we use here for modeling security choices. The proposed decision making model facilitates quantitative analysis of influencing information security behavior by capturing the criteria affecting the choice and their importance to the decision maker.Within this model, we will characterize the optimal modification of the criteria values, taking into account that not all criteria can be changed. We show how subtle defaults influence the choice of the decision maker and calculate their impact. We apply our model to derive optimal policies for the case study of a public Wi-Fi network selection, in which the graphical user interface aims to influence the user to a particular security behavior.

Original languageEnglish
Title of host publicationComputer Performance Engineering - 11th European Workshop, EPEW 2014, Proceedings
PublisherSpringer Verlag
Pages194-208
Number of pages15
ISBN (Print)9783319108841
DOIs
Publication statusPublished - 2014
Event11th European Workshop on Computer Performance Engineering, EPEW 2014 - Florence, Italy
Duration: 11 Sept 201412 Sept 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8721 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th European Workshop on Computer Performance Engineering, EPEW 2014
Country/TerritoryItaly
CityFlorence
Period11/09/1412/09/14

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A decision making model of influencing behavior in information security'. Together they form a unique fingerprint.

Cite this