TY - JOUR
T1 - Cybersecurity end-user compliance: Password management versus update compliance
AU - Datta, Pratim
AU - Krancher, Oliver
PY - 2024
Y1 - 2024
N2 - In today's world, organizations rely on cybersecurity end-user compliance as an essential practical parameter. Yet cybersecurity compliance remains a challenge, and failures are commonplace. But why? In addressing this question, we argue that ISP compliance is neither too monolithic nor too granular a construct but needs respecification. We empirically investigate cybersecurity antecedents leading to (i) user protection-centric password management and (ii) system protection-centric update compliance dimensions. The results of our survey of 241 users show differentiating behavioral strands intertwined across different types of compliance, highlighting a unique interplay of attitudes, knowledge, and social factors as antecedents to password and update compliance.
AB - In today's world, organizations rely on cybersecurity end-user compliance as an essential practical parameter. Yet cybersecurity compliance remains a challenge, and failures are commonplace. But why? In addressing this question, we argue that ISP compliance is neither too monolithic nor too granular a construct but needs respecification. We empirically investigate cybersecurity antecedents leading to (i) user protection-centric password management and (ii) system protection-centric update compliance dimensions. The results of our survey of 241 users show differentiating behavioral strands intertwined across different types of compliance, highlighting a unique interplay of attitudes, knowledge, and social factors as antecedents to password and update compliance.
KW - End-user compliance
KW - Behavioral economics
KW - Biases
KW - Diligence
KW - IT security knowledge
KW - Social networking activity
U2 - 10.1016/j.im.2024.104060
DO - 10.1016/j.im.2024.104060
M3 - Journal article
SN - 0378-7206
VL - 61
SP - 1
JO - Information & Management
JF - Information & Management
IS - 8
ER -