Ayuda
Ir al contenido

Dialnet


Resumen de InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior.

Michael Curry, Byron Marshall, John Correia, Robert E. Crossler

  • The possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating compliance behavior with control expectations from 47 percent to 60 percent. Importantly, the model constructs offer measurable indications despite practical limitations on organizations' ability to assess problematic individual password behavior. A threefold increase in one measure of strong password behavior suggested the process positively impacted individual cybersecurity behavior. The results suggest that the process-nuanced IPAM approach is promising both for assessing and impacting security compliance behavior. [ABSTRACT FROM AUTHOR]


Fundación Dialnet

Dialnet Plus

  • Más información sobre Dialnet Plus