Abstract
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to comply with information security policies and engage in effective cyber prevention. Here we introduce and evaluate The Cybersurvival Task, a ranking task that highlights cybersecurity misconceptions amongst employees and that serves as a reflective exercise for security experts. We describe an initial deployment and refinement of the task in one organisation and a second deployment and evaluation in another. We show how the Cybersurvival Task could be used to detect 'shadow security' cultures within an organisation and illustrate how a group discussion about the importance of different cyber behaviours led to the weakening of staff's cybersecurity positions (i.e. more disagreement with experts). We also discuss its use as a tool to inform organisational policy-making and the design of campaigns and training events, ensuring that they are better tailored to specific staff groups and designed to target problematic behaviours.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018 |
| Editors | Mary Ellen Zurko, Heather Richter Lipford, Sonia Chiasson, Rob Reeder |
| Place of Publication | United States |
| Publisher | USENIX Association |
| Pages | 443-457 |
| Number of pages | 15 |
| ISBN (Electronic) | 9781939133106, 9781931971454 |
| DOIs | |
| Publication status | Published - 12 Aug 2018 |
| Externally published | Yes |
| Event | 14th Symposium on Usable Privacy and Security - Baltimore Marriott Waterfront, Baltimore, United States Duration: 12 Aug 2018 → 14 Aug 2018 Conference number: 14th https://www.usenix.org/conference/soups2018 |
Other
| Other | 14th Symposium on Usable Privacy and Security |
|---|---|
| Abbreviated title | SOUPS 2018 |
| Country/Territory | United States |
| City | Baltimore |
| Period | 12/08/18 → 14/08/18 |
| Internet address |
Keywords
- Cyber security
- Group discussions
- Information security policies
- Initial deployments
- Organisational
- Policy making
- Security experts