‘The trivial tickets build the trust’: a co-design approach to understanding security support interactions in a large university

Author:

Demjaha Albesë12ORCID,Pym David134,Caulfield Tristan1ORCID,Parkin Simon5ORCID

Affiliation:

1. Department of Computer Science, University College London , Gower Street , London WC1E 6BT, United Kingdom

2. The Alan Turing Institute , 96 Euston Rd , London NW1 2DB, United Kingdom

3. Department of Philosophy, University College London , Gower Street , London WC1E 6BT, United Kingdom

4. Institute of Philosophy, University of London , Malet St , London WC1E 7HU, United Kingdom

5. Faculty of Technology, Policy and Management, Delft University of Technology , Mekelweg 5, 2628 CD Delft, The Netherlands

Abstract

Abstract Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviours. We apply a co-design methodology to harmonize employee behaviour and centralized security management in a large university. This involves iterative rounds of interviews connected by the co-design methodology: 14 employees working with high-value data with specific security needs; seven support staff across both local and central IT and IT-security support teams; and two senior security decision-makers in the organization. We find that employees prefer local support together with assurances that they are behaving securely, rather than precise instructions that lack local context. Trust in support teams that understand local needs also improves engagement, especially for employees who are unsure what to do. Policy is understood by employees through their interactions with support staff and when they see colleagues enacting secure behaviours in the workplace. The iterative co-design approach brings together the viewpoints of a range of employee groups and security decision-makers that capture key influences that drive secure working practices. We provide recommendations for improvements to workplace security, including recognizing that communication of the policy is as important as what is in the policy.

Publisher

Oxford University Press (OUP)

Reference61 articles.

1. The compliance budget: managing security behaviour in organisations;Beautement,2008

2. Users are not the enemy;Adams;Commun ACM,1999

3. Unpacking security policy compliance: the motivators and barriers of employees’ security behaviors;Blythe,2015

4. Moving from a ‘human-as-problem’ to a ‘human-as-solution’ cybersecurity mindset;Zimmermann;Int J Hum Comput Stud,2019

5. Security dialogues: building better relationships between security and business;Ashenden;IEEE Secur Priv,2016

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3