Artwork

İçerik Tom Stafford tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Tom Stafford veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.
Player FM - Podcast Uygulaması
Player FM uygulamasıyla çevrimdışı Player FM !

Insiders' Adaptations to Security Demands with Clay Posey and Tom Roberts

38:00
 
Paylaş
 

Manage episode 331764887 series 2978622
İçerik Tom Stafford tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Tom Stafford veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

Protecting organizational information systems and information assets is a complex undertaking for both security professionals and end-users. In this episode of Cyber Ways, we discuss behavioral complexity as it relates to end-users' security behaviors with Dr. Clay Posey of Brigham Young University and Dr. Tom Roberts of the University of Texas at Tyler. We talk with Drs. Posey and Roberts about their 2017 paper, Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Control, which was published in Information Systems Frontiers.
Security Roles:

  • Account protection
  • Reporting of suspicious behavior
  • Policy-driven awareness and action
  • Verbal and electronic sensitive-information protection
  • Legitimate email handling
  • Protection against unauthorized exposure
  • Distinctive security etiquette
  • Secure software, email, and Internet use
  • Appropriate data entry and management
  • Wireless installation
  • Widely applicable security etiquette
  • Co-worker reliance
  • Document conversion
  • Equipment location and storage

Burns, A. J., Posey, C., & Roberts, T. L. (2021). Insiders’ adaptations to security-based demands in the workplace: An examination of security behavioral complexity. Information Systems Frontiers, 23(2), 343-

Intro audio for the Cyber Ways Podcast

Outro audio for Cyber Ways Podcast

Cyber Ways is brought to you by the Center for Information Assurance, which is housed in the College of Business at Louisiana Tech University. The podcast is made possible through a "Just Business Grant," which is funded by the University's generous donors.
https://business.latech.edu/cyberways/

  continue reading

25 bölüm

Artwork
iconPaylaş
 
Manage episode 331764887 series 2978622
İçerik Tom Stafford tarafından sağlanmıştır. Bölümler, grafikler ve podcast açıklamaları dahil tüm podcast içeriği doğrudan Tom Stafford veya podcast platform ortağı tarafından yüklenir ve sağlanır. Birinin telif hakkıyla korunan çalışmanızı izniniz olmadan kullandığını düşünüyorsanız burada https://tr.player.fm/legal özetlenen süreci takip edebilirsiniz.

Protecting organizational information systems and information assets is a complex undertaking for both security professionals and end-users. In this episode of Cyber Ways, we discuss behavioral complexity as it relates to end-users' security behaviors with Dr. Clay Posey of Brigham Young University and Dr. Tom Roberts of the University of Texas at Tyler. We talk with Drs. Posey and Roberts about their 2017 paper, Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Control, which was published in Information Systems Frontiers.
Security Roles:

  • Account protection
  • Reporting of suspicious behavior
  • Policy-driven awareness and action
  • Verbal and electronic sensitive-information protection
  • Legitimate email handling
  • Protection against unauthorized exposure
  • Distinctive security etiquette
  • Secure software, email, and Internet use
  • Appropriate data entry and management
  • Wireless installation
  • Widely applicable security etiquette
  • Co-worker reliance
  • Document conversion
  • Equipment location and storage

Burns, A. J., Posey, C., & Roberts, T. L. (2021). Insiders’ adaptations to security-based demands in the workplace: An examination of security behavioral complexity. Information Systems Frontiers, 23(2), 343-

Intro audio for the Cyber Ways Podcast

Outro audio for Cyber Ways Podcast

Cyber Ways is brought to you by the Center for Information Assurance, which is housed in the College of Business at Louisiana Tech University. The podcast is made possible through a "Just Business Grant," which is funded by the University's generous donors.
https://business.latech.edu/cyberways/

  continue reading

25 bölüm

Tüm bölümler

×
 
Loading …

Player FM'e Hoş Geldiniz!

Player FM şu anda sizin için internetteki yüksek kalitedeki podcast'leri arıyor. En iyi podcast uygulaması ve Android, iPhone ve internet üzerinde çalışıyor. Aboneliklerinizi cihazlar arasında eş zamanlamak için üye olun.

 

Hızlı referans rehberi