메뉴 건너뛰기




Volumn 52, Issue , 2015, Pages 128-141

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs

Author keywords

Cognitive bias; Cultural bias; Information security awareness; Risk decision making; Security behavior; Security policy compliance

Indexed keywords

DECISION MAKING; ECONOMICS; MOBILE SECURITY; RISK PERCEPTION; SECURITY SYSTEMS;

EID: 84930200251     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2015.04.006     Document Type: Article
Times cited : (141)

References (66)
  • 1
    • 3242812017 scopus 로고    scopus 로고
    • Privacy in electronic commerce and the economics of immediate gratification
    • May 17-20, 2004, New York, USA
    • A. Acquisti Privacy in electronic commerce and the economics of immediate gratification Proceedings of the 5th ACM Conference on Electronic Commerce, May 17-20, 2004, New York, USA 2004
    • (2004) Proceedings of the 5th ACM Conference on Electronic Commerce
    • Acquisti, A.1
  • 2
    • 0141901789 scopus 로고    scopus 로고
    • When predictions fail: the dilemma of unrealistic optimism
    • T. Gilovich, D.W. Griffin, D. Kahneman, Cambridge University Press
    • D.A. Armor, and S.E. Taylor When predictions fail: the dilemma of unrealistic optimism T. Gilovich, D.W. Griffin, D. Kahneman, Heuristics and biases 2002 Cambridge University Press 334 347
    • (2002) Heuristics and biases , pp. 334-347
    • Armor, D.A.1    Taylor, S.E.2
  • 4
    • 3042557805 scopus 로고    scopus 로고
    • The impact of emotional tone, message, and broadcast parameters in youth anti-smoking advertisements
    • L. Biener, M. Ji, E.A. Gilpin, and A.B. Albers The impact of emotional tone, message, and broadcast parameters in youth anti-smoking advertisements J Health Commun 9 3 2004 259 274
    • (2004) J Health Commun , vol.9 , Issue.3 , pp. 259-274
    • Biener, L.1    Ji, M.2    Gilpin, E.A.3    Albers, A.B.4
  • 5
    • 0032430499 scopus 로고    scopus 로고
    • Testing the cultural theory of risk in France
    • J. Brenot, S. Bonnefous, and C. Marris Testing the cultural theory of risk in France Risk Anal 18 6 1998 729 739
    • (1998) Risk Anal , vol.18 , Issue.6 , pp. 729-739
    • Brenot, J.1    Bonnefous, S.2    Marris, C.3
  • 6
    • 77957061746 scopus 로고    scopus 로고
    • Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
    • B. Bulgurcu, H. Cavusoglu, and I. Benbasat Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness MIS Quarterly 34 3 2010 523 548
    • (2010) MIS Quarterly , vol.34 , Issue.3 , pp. 523-548
    • Bulgurcu, B.1    Cavusoglu, H.2    Benbasat, I.3
  • 7
    • 84884529857 scopus 로고    scopus 로고
    • A literature review of cognitive biases in negotiation process
    • A. Caputo A literature review of cognitive biases in negotiation process Int J Confl Manag 24 4 2013 374 398
    • (2013) Int J Confl Manag , vol.24 , Issue.4 , pp. 374-398
    • Caputo, A.1
  • 8
    • 0041934523 scopus 로고    scopus 로고
    • Incorporating the irrelevant: anchors in judgments of belief and value
    • T. Gilovich, D.W. Griffin, D. Kahneman, Cambridge University Press
    • G.B. Chapman, and E.J. Johnsons Incorporating the irrelevant: anchors in judgments of belief and value T. Gilovich, D.W. Griffin, D. Kahneman, Heuristics and biases 2002 Cambridge University Press 120 138
    • (2002) Heuristics and biases , pp. 120-138
    • Chapman, G.B.1    Johnsons, E.J.2
  • 9
    • 67649551429 scopus 로고    scopus 로고
    • User awareness of security countermeasures and its impact on information systems misuse
    • J. D'Arcy, A. Hovav, and D. Galletta User awareness of security countermeasures and its impact on information systems misuse Information Syst Res 20 1 2009 79 98
    • (2009) Information Syst Res , vol.20 , Issue.1 , pp. 79-98
    • D'Arcy, J.1    Hovav, A.2    Galletta, D.3
  • 10
    • 77956187913 scopus 로고    scopus 로고
    • It won't happen to me: promoting secure behaviour among internet users
    • N. Davinson, and E. Sillence It won't happen to me: promoting secure behaviour among internet users Comput Hum Behav 26 6 2010 1739 1747
    • (2010) Comput Hum Behav , vol.26 , Issue.6 , pp. 1739-1747
    • Davinson, N.1    Sillence, E.2
  • 11
    • 0040736130 scopus 로고    scopus 로고
    • MINERVA-DM: a memory process model for judgments of likelihood
    • M.R.P. Dougherty, C.F. Gettys, and E.E. Ogden MINERVA-DM: a memory process model for judgments of likelihood Psychol Rev 106 1 1999 180 209
    • (1999) Psychol Rev , vol.106 , Issue.1 , pp. 180-209
    • Dougherty, M.R.P.1    Gettys, C.F.2    Ogden, E.E.3
  • 13
    • 84867697860 scopus 로고    scopus 로고
    • accessed 12.12.14
    • ENISA Secure USB flash drives 2008 Retrieved from http://www.enisa.europa.eu/publications/archive/secure-usb-flash-drives-en [accessed 12.12.14]
    • (2008) Secure USB flash drives
    • ENISA1
  • 16
    • 0041109884 scopus 로고    scopus 로고
    • Time discounting and time preference: a critical review
    • S. Frederick, G. Loewenstein, and T. O'Donoghue Time discounting and time preference: a critical review J Econ Literature 40 2 2002 351 401
    • (2002) J Econ Literature , vol.40 , Issue.2 , pp. 351-401
    • Frederick, S.1    Loewenstein, G.2    O'Donoghue, T.3
  • 17
    • 78650975095 scopus 로고    scopus 로고
    • A literature review of the anchoring effect
    • A. Furnham, and C.H. Boo A literature review of the anchoring effect J Socio-Economics 40 1 2011 35 42
    • (2011) J Socio-Economics , vol.40 , Issue.1 , pp. 35-42
    • Furnham, A.1    Boo, C.H.2
  • 22
    • 85003712015 scopus 로고    scopus 로고
    • Designing a security awareness program: Part I
    • S. Hansche Designing a security awareness program: Part I Inf Syst Secur 9 6 2001 14 23
    • (2001) Inf Syst Secur , vol.9 , Issue.6 , pp. 14-23
    • Hansche, S.1
  • 23
    • 67349144062 scopus 로고    scopus 로고
    • Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness
    • T. Herath, and H.R. Rao Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness Decis Support 47 2 2009 154 165
    • (2009) Decis Support , vol.47 , Issue.2 , pp. 154-165
    • Herath, T.1    Rao, H.R.2
  • 24
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: a framework for security policy compliance in organisations
    • T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations Eur J Inform Syst 18 2 2009 106 125
    • (2009) Eur J Inform Syst , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 25
    • 0042184035 scopus 로고    scopus 로고
    • The affect effect in insurance decisions
    • C.K. Hsee, and H.C. Kunreuther The affect effect in insurance decisions J Risk Uncertain 20 2 2000 141 159
    • (2000) J Risk Uncertain , vol.20 , Issue.2 , pp. 141-159
    • Hsee, C.K.1    Kunreuther, H.C.2
  • 27
    • 80052328300 scopus 로고    scopus 로고
    • Factors affecting perception of information security and their impacts on IT adoption and security practices
    • D. Huang, P.P. Rau, G. Salvendy, F. Gao, and J. Zhou Factors affecting perception of information security and their impacts on IT adoption and security practices Int J Human-Comput Stud 69 12 2011 870 883
    • (2011) Int J Human-Comput Stud , vol.69 , Issue.12 , pp. 870-883
    • Huang, D.1    Rau, P.P.2    Salvendy, G.3    Gao, F.4    Zhou, J.5
  • 28
    • 84856018908 scopus 로고    scopus 로고
    • Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory
    • P. Ifinedo Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory Comput Secur 31 1 2012 83 95
    • (2012) Comput Secur , vol.31 , Issue.1 , pp. 83-95
    • Ifinedo, P.1
  • 29
    • 0041906967 scopus 로고
    • Choices, values, and frames
    • D. Kahneman, and A. Tversky Choices, values, and frames Am Psychol 39 4 1984 341 350
    • (1984) Am Psychol , vol.39 , Issue.4 , pp. 341-350
    • Kahneman, D.1    Tversky, A.2
  • 30
    • 0013305901 scopus 로고    scopus 로고
    • Representativeness revisited: attribute substitution in intuitive judgment
    • T. Gilovich, D.W. Griffin, D. Kahneman, Cambridge University Press
    • D. Kahneman, and S. Frederick Representativeness revisited: attribute substitution in intuitive judgment T. Gilovich, D.W. Griffin, D. Kahneman, Heuristics and biases 2002 Cambridge University Press 49 81
    • (2002) Heuristics and biases , pp. 49-81
    • Kahneman, D.1    Frederick, S.2
  • 31
    • 79960943254 scopus 로고    scopus 로고
    • Before you make that big decision
    • D. Kahneman, D. Lovallo, and O. Sibony Before you make that big decision Harv Bus Rev 89 6 2011 50 60
    • (2011) Harv Bus Rev , vol.89 , Issue.6 , pp. 50-60
    • Kahneman, D.1    Lovallo, D.2    Sibony, O.3
  • 32
    • 80052902327 scopus 로고    scopus 로고
    • Toward a new meta-theory for designing information systems (IS) security training approaches
    • M. Karjalainen, and M. Siponen Toward a new meta-theory for designing information systems (IS) security training approaches J Assoc Inform Syst 12 8 2011 518 555
    • (2011) J Assoc Inform Syst , vol.12 , Issue.8 , pp. 518-555
    • Karjalainen, M.1    Siponen, M.2
  • 33
    • 0034316957 scopus 로고    scopus 로고
    • Health care management and information systems security: Awareness, training or education?
    • S. Katsikas Health care management and information systems security: Awareness, training or education? International Journal of Medical Informatics 60 2 2000 129 135
    • (2000) International Journal of Medical Informatics , vol.60 , Issue.2 , pp. 129-135
    • Katsikas, S.1
  • 34
    • 0033653492 scopus 로고    scopus 로고
    • Public perceptions of health risks from polluted coastal bathing waters: a mixed methodological analysis using cultural theory
    • I. Langford, S. Georgiou, I. Bateman, R. Day, and R. Turner Public perceptions of health risks from polluted coastal bathing waters: a mixed methodological analysis using cultural theory Risk Anal: An Int J 20 5 2000 691 705
    • (2000) Risk Anal: An Int J , vol.20 , Issue.5 , pp. 691-705
    • Langford, I.1    Georgiou, S.2    Bateman, I.3    Day, R.4    Turner, R.5
  • 35
    • 0001371817 scopus 로고
    • Biased assimilation and attitude polarization: the effects of prior theories on subsequently considered evidence
    • C.G. Lord, L. Ross, and M.R. Lepper Biased assimilation and attitude polarization: the effects of prior theories on subsequently considered evidence J Pers Soc Psychol 37 1979 2098 2109
    • (1979) J Pers Soc Psychol , vol.37 , pp. 2098-2109
    • Lord, C.G.1    Ross, L.2    Lepper, M.R.3
  • 36
    • 0032190798 scopus 로고    scopus 로고
    • A quantitative test of the cultural theory of risk perceptions: comparison with the psychometric paradigm
    • C. Marris, I.H. Langford, and T. O'Riordan A quantitative test of the cultural theory of risk perceptions: comparison with the psychometric paradigm Risk Anal 18 5 1998 635 647
    • (1998) Risk Anal , vol.18 , Issue.5 , pp. 635-647
    • Marris, C.1    Langford, I.H.2    O'Riordan, T.3
  • 37
    • 0000245521 scopus 로고    scopus 로고
    • Confirmation bias: a ubiquitous phenomenon in many guises
    • R.S. Nickerson Confirmation bias: a ubiquitous phenomenon in many guises Rev General Psychol 2 2 1998 175 220
    • (1998) Rev General Psychol , vol.2 , Issue.2 , pp. 175-220
    • Nickerson, R.S.1
  • 42
    • 84993099250 scopus 로고
    • Implementing an information security awareness program
    • T.R. Peltier Implementing an information security awareness program Inf Syst Secur 14 2 1995 37 48
    • (1995) Inf Syst Secur , vol.14 , Issue.2 , pp. 37-48
    • Peltier, T.R.1
  • 43
    • 0034271735 scopus 로고    scopus 로고
    • Risky business: what we have yet to learn about risk management
    • S.L. Pfleeger Risky business: what we have yet to learn about risk management J Syst Softw 53 3 2000 265 273
    • (2000) J Syst Softw , vol.53 , Issue.3 , pp. 265-273
    • Pfleeger, S.L.1
  • 44
    • 84857359642 scopus 로고    scopus 로고
    • Unrealistic optimism on information security management
    • H.S. Rhee, Y.U. Ryu, and C.T. Kim Unrealistic optimism on information security management Comput Secur 31 2 2012 221 232
    • (2012) Comput Secur , vol.31 , Issue.2 , pp. 221-232
    • Rhee, H.S.1    Ryu, Y.U.2    Kim, C.T.3
  • 45
    • 77953661849 scopus 로고    scopus 로고
    • Always on my mind: exploring how frequent, recent, and vivid television portrayals are used in the formation of social reality judgments
    • K. Riddle Always on my mind: exploring how frequent, recent, and vivid television portrayals are used in the formation of social reality judgments Media Psychol 13 2 2010 155 179
    • (2010) Media Psychol , vol.13 , Issue.2 , pp. 155-179
    • Riddle, K.1
  • 46
    • 84921972551 scopus 로고    scopus 로고
    • Cultural theory and risk perception: a proposal for a better measurement
    • S. Rippl Cultural theory and risk perception: a proposal for a better measurement J Risk Res 5 2 2002 147 165
    • (2002) J Risk Res , vol.5 , Issue.2 , pp. 147-165
    • Rippl, S.1
  • 47
    • 45749124001 scopus 로고    scopus 로고
    • The psychology of security
    • Springer Berlin Heidelberg
    • B. Schneier The psychology of security Progress in cryptology -AFRICACRYPT, LNCS vol. 5023 2008 Springer Berlin Heidelberg 50 79
    • (2008) Progress in cryptology -AFRICACRYPT, LNCS , vol.5023 , pp. 50-79
    • Schneier, B.1
  • 48
    • 35948981827 scopus 로고    scopus 로고
    • Neural mechanisms mediating optimism bias
    • T. Sharot, A.M. Riccardi, C.M. Raio, and E.A. Phelps Neural mechanisms mediating optimism bias Nature 450 7166 2007 102 105
    • (2007) Nature , vol.450 , Issue.7166 , pp. 102-105
    • Sharot, T.1    Riccardi, A.M.2    Raio, C.M.3    Phelps, E.A.4
  • 49
    • 0000151027 scopus 로고
    • Imagining can heighten or lower the perceived likelihood of contracting a disease: the mediating effect of ease of imagery
    • J. Sherman, R.B. Cialdini, D.F. Schwartzman, and K.D. Reynolds Imagining can heighten or lower the perceived likelihood of contracting a disease: the mediating effect of ease of imagery Personality Soc Psychol Bull 11 1 1985 118 127
    • (1985) Personality Soc Psychol Bull , vol.11 , Issue.1 , pp. 118-127
    • Sherman, J.1    Cialdini, R.B.2    Schwartzman, D.F.3    Reynolds, K.D.4
  • 50
    • 38149063389 scopus 로고    scopus 로고
    • Security design based on social and cultural practice: sharing of passwords
    • N. Aykin, Springer Berlin Heidelberg Berlin
    • S. Singh, A. Cabraal, C. Demosthenous, G. Astbrink, and M. Furlong Security design based on social and cultural practice: sharing of passwords N. Aykin, Usability and internationalization 2007 Springer Berlin Heidelberg Berlin 476 485
    • (2007) Usability and internationalization , pp. 476-485
    • Singh, S.1    Cabraal, A.2    Demosthenous, C.3    Astbrink, G.4    Furlong, M.5
  • 51
    • 77149132467 scopus 로고    scopus 로고
    • Compliance with information security policies: an empirical investigation
    • M. Siponen, S. Pahnila, and M.A. Mahmood Compliance with information security policies: an empirical investigation IEEE Comput 43 2 2010 64 72
    • (2010) IEEE Comput , vol.43 , Issue.2 , pp. 64-72
    • Siponen, M.1    Pahnila, S.2    Mahmood, M.A.3
  • 52
    • 0038127717 scopus 로고    scopus 로고
    • Two systems of reasoning
    • T. Gilovich, D.W. Griffin, D. Kahneman, Cambridge University Press
    • S.A. Sloman Two systems of reasoning T. Gilovich, D.W. Griffin, D. Kahneman, Heuristics and biases 2002 Cambridge University Press 379 396
    • (2002) Heuristics and biases , pp. 379-396
    • Sloman, S.A.1
  • 53
    • 0023324565 scopus 로고
    • Perception of risk
    • P. Slovic Perception of risk Science 236 4799 1987 280 285
    • (1987) Science , vol.236 , Issue.4799 , pp. 280-285
    • Slovic, P.1
  • 54
    • 0010733621 scopus 로고    scopus 로고
    • The affect heuristic
    • T. Gilovich, D.W. Griffin, D. Kahneman, Cambridge University Press
    • P. Slovic, M. Finucane, E. Peters, and D.G. MacGregor The affect heuristic T. Gilovich, D.W. Griffin, D. Kahneman, Heuristics and biases 2002 Cambridge University Press 397 420
    • (2002) Heuristics and biases , pp. 397-420
    • Slovic, P.1    Finucane, M.2    Peters, E.3    MacGregor, D.G.4
  • 55
    • 2442472242 scopus 로고    scopus 로고
    • Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality
    • P. Slovic, M.L. Finucane, E. Peters, and D.G. MacGregor Risk as analysis and risk as feelings: some thoughts about affect, reason, risk, and rationality Risk Anal 24 2 2004 311 322
    • (2004) Risk Anal , vol.24 , Issue.2 , pp. 311-322
    • Slovic, P.1    Finucane, M.L.2    Peters, E.3    MacGregor, D.G.4
  • 56
    • 0000892204 scopus 로고
    • Behavioral decision theory perspectives on risk and safety
    • P. Slovic, B. Fischhoff, and S. Lichtenstein Behavioral decision theory perspectives on risk and safety Acta Psychol 56 1-3 1984 183 203
    • (1984) Acta Psychol , vol.56 , Issue.1-3 , pp. 183-203
    • Slovic, P.1    Fischhoff, B.2    Lichtenstein, S.3
  • 57
    • 0034077530 scopus 로고    scopus 로고
    • Violence risk assessment and risk communication: the effects of using actual cases, providing instructions, and employing probability vs. frequency formats
    • P. Slovic, J. Monahan, and D.M. MacGregor Violence risk assessment and risk communication: the effects of using actual cases, providing instructions, and employing probability vs. frequency formats Law Hum Behav 24 3 2000 271 296
    • (2000) Law Hum Behav , vol.24 , Issue.3 , pp. 271-296
    • Slovic, P.1    Monahan, J.2    MacGregor, D.M.3
  • 58
    • 84893698217 scopus 로고    scopus 로고
    • Variables influencing information security policy compliance: a systematic review of quantitative studies
    • T. Sommestad, J. Hallberg, K. Lundholm, and J. Bengtsson Variables influencing information security policy compliance: a systematic review of quantitative studies Inform Manag Comput Secur 22 1 2014 42 75
    • (2014) Inform Manag Comput Secur , vol.22 , Issue.1 , pp. 42-75
    • Sommestad, T.1    Hallberg, J.2    Lundholm, K.3    Bengtsson, J.4
  • 59
    • 77956610608 scopus 로고    scopus 로고
    • A safety approach to information security communications
    • G. Stewart A safety approach to information security communications, Inf Secur Tech Rep 14 4 2009 197 201
    • (2009) Inf Secur Tech Rep , vol.14 , Issue.4 , pp. 197-201
    • Stewart, G.1
  • 60
    • 84858678688 scopus 로고    scopus 로고
    • Death by a thousand facts: criticising the technocratic approach to information security awareness
    • G. Stewart, and D. Lacey Death by a thousand facts: criticising the technocratic approach to information security awareness Inform Manag Comput Secur 20 1 2012 29 38
    • (2012) Inform Manag Comput Secur , vol.20 , Issue.1 , pp. 29-38
    • Stewart, G.1    Lacey, D.2
  • 61
    • 0031478080 scopus 로고    scopus 로고
    • Explaining the enigmatic anchoring effect: mechanisms of selective accessibility
    • F. Strack, and T. Mussweiler Explaining the enigmatic anchoring effect: mechanisms of selective accessibility J Pers Soc Psychol 73 3 1997 437 446
    • (1997) J Pers Soc Psychol , vol.73 , Issue.3 , pp. 437-446
    • Strack, F.1    Mussweiler, T.2
  • 62
    • 33744805562 scopus 로고    scopus 로고
    • Formulating information systems risk management strategies through cultural theory
    • A. Tsohou, M. Karyda, S. Kokolakis, and E. Kiountouzis Formulating information systems risk management strategies through cultural theory Inform Manag Comput Secur 14 3 2006 198 217
    • (2006) Inform Manag Comput Secur , vol.14 , Issue.3 , pp. 198-217
    • Tsohou, A.1    Karyda, M.2    Kokolakis, S.3    Kiountouzis, E.4
  • 63
    • 0016264378 scopus 로고
    • Judgment under uncertainty: heuristics and biases
    • A. Tversky, and D. Kahneman Judgment under uncertainty: heuristics and biases Science 185 1974 1124 1131
    • (1974) Science , vol.185 , pp. 1124-1131
    • Tversky, A.1    Kahneman, D.2
  • 64
    • 84861093724 scopus 로고    scopus 로고
    • Motivating is security compliance: insights from habit and protection motivation theory
    • A. Vance, M. Siponen, and S. Pahnila Motivating is security compliance: insights from habit and protection motivation theory Inform Manage 49 3-4 2012 190 198
    • (2012) Inform Manage , vol.49 , Issue.3-4 , pp. 190-198
    • Vance, A.1    Siponen, M.2    Pahnila, S.3
  • 65
    • 0029265005 scopus 로고
    • Resistance to personal risk perceptions to debiasing interventions
    • N.D. Weinstein, and W.M. Klein Resistance to personal risk perceptions to debiasing interventions Health Psychol 14 2 1995 132 140
    • (1995) Health Psychol , vol.14 , Issue.2 , pp. 132-140
    • Weinstein, N.D.1    Klein, W.M.2
  • 66
    • 0001213144 scopus 로고    scopus 로고
    • Subliminal affective priming resists attributional interventions
    • P. Winkielman, R.B. Zajonc, and N. Schwarz Subliminal affective priming resists attributional interventions Cognition Emot 11 4 1997 433 465
    • (1997) Cognition Emot , vol.11 , Issue.4 , pp. 433-465
    • Winkielman, P.1    Zajonc, R.B.2    Schwarz, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.