To read this content please select one of the options below:

The application of behavioural thresholds to analyse collective behaviour in information security

Dirk Snyman (School of Computer, Statistical and Mathematical Sciences, North-West University, Potchefstroom, South Africa)
Hennie Kruger (School of Computer, Statistical and Mathematical Sciences, North-West University, Potchefstroom, South Africa)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 12 June 2017

525

Abstract

Purpose

The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns.

Design/methodology/approach

Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour.

Findings

Initial experimental results show that behavioural threshold analysis is feasible in the context of information security and may provide useful guidelines on how to construct information security awareness programmes.

Practical implications

Threshold analysis may contribute in a number of ways to information security, e.g. identification of security issues that are susceptible to peer pressure and easily influenced by peer behaviour; serve as a countermeasure against security fatigue; contribute to the economics of information security awareness programmes; track progress of security awareness campaigns; and provide a new measure for determining the importance of security awareness issues.

Originality/value

This paper describes the very first experiment to test the behavioural threshold analysis concepts in the context of information security.

Keywords

Citation

Snyman, D. and Kruger, H. (2017), "The application of behavioural thresholds to analyse collective behaviour in information security", Information and Computer Security, Vol. 25 No. 2, pp. 152-164. https://doi.org/10.1108/ICS-03-2017-0015

Publisher

:

Emerald Publishing Limited

Copyright © 2017, Emerald Publishing Limited

Related articles