Iryna Yevseyeva, James Turland, Charles Morisset, Lynne Coventry, Thomas Gross, Christopher Laing, Aad van Moorsel

Abstract

In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.

Date: September 27, 2015
Published: International Journal of Information Systems and Project Management, September 2015, vol. 3, no. 3, pp. 5-22.
Publisher: SciKA
Publisher URL: http://www.sciencesphere.org/ijispm/index.php?p=5001
DOI: http://dx.doi.org/10.12821/ijispm030301
Open Access: http://www.sciencesphere.org/ijispm/archive/ijispm-030301.pdf

Categories: Publications