I. Kirlappos, S. Parkin, M. A. Sasse
Over the past decade, security researchers and practitioners have tried to understand why employees do not comply with organizational security policies and mechanisms. Past research has treated compliance as a binary decision: people comply, or they do not. From our analysis of 118 in-depth interviews with individuals (employees in a large multinational organization) about security non-compliance, a 3rd response emerges: shadow security. This describes the instances where security-conscious employees who think they cannot comply with the prescribed security policy create a more fitting alternative to the policies and mechanisms created by the organization’s official security staff. These workarounds are usually not visible to official security and higher management – hence ‘shadow security’. They may not be as secure as the ‘official’ policy would be in theory, but they reflect the best compromise staff can find between getting the job done and managing the risks that the assets they understand face. We conclude that rather than trying to ‘stamp out’ shadow security practices, organizations should learn from them: they provide a starting point ‘workable’ security: solutions that offer effective security and fit with the organization’s business, rather than impede it.
Date: February 23-26, 2014 Presented: Workshop on Usable Security (USEC), San Diego, California, 2014. Publisher: Internet Society ISBN: 189156237 1 Publisher URL: http://www.internetsociety.org/doc/learning-%E2%80%9Cshadow-security%E2%80%9D-why-understanding-non-compliance-provides-basis-effective-security Full Text: http://www.internetsociety.org/sites/default/files/01_4-paper.pdf DOI: http://dx.doi.org/10.14722/usec.2014.23007 Open Access: http://discovery.ucl.ac.uk/id/eprint/1424472