Skip to main content

Human–Computer Interaction and Systems Security: An Organisational Appraisal

  • Conference paper
Interdisciplinary Aspects of Information Systems Studies

Abstract

The motivation of the current paper is the search for responses about decision making in both context, computer and non-computer scenarios, thus whether no difference shall be found, the large behavioural literature on non-computer decision making can be used to interpret security issues. The effort is then devoted to identify organisational theoretical domains in order to approach the security problems. In particular it is identified a set of organisational literature contribution to emerging forms of organisations and behaviours with respect to the human factor and security problems [1–5]. While many authors propose a top-down view of organisational/policy-directed security the proposition of this paper is a bottom-up analysis, addressed to the end-user as a member of the organisation and moreover of its culture. As the results of the work, a threefold set of theoretical frameworks has been identified, leading to a robust conceptual base: the “Contingency Model of Strategic Risk Taking” of Baird [2]; the “Strategic modeling technique for information security risk assessment” of Misra [4], and a major contribution of Ciborra’s work [3, 6, 7].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adams, A. and Blandford, A. (2005). Bridging the gap between organizational and user per-spectives of security in the clinical domain. International Journal of Human-Computer Studies, 63, 175-202.

    Article  Google Scholar 

  2. Baird, I. S. and Thomas, H. (1985). Toward a contingency model of strategic risk taking. Academy of Management Review, 10(2), 230-245.

    Article  Google Scholar 

  3. Ciborra, C. (2004). The Labyrints of Information, Oxford University Press, Oxford, UK.

    Book  Google Scholar 

  4. Misra, S. C., Kumar, V., and Kumar, U. (2007). A Strategic modeling technique for informa-tion security risk assessment. Information Management & Computer Security, 15(1), 64-77.

    Article  Google Scholar 

  5. Orlikowski, W. J. (2000). Using technology and constituting structures: A practice lens for studying technology in organizations. Organization Science, 11(4), 404-428.

    Article  Google Scholar 

  6. Ciborra, C. (1993). Teams Markets and Systems, Cambridge University Press, Cambridge, UK.

    Google Scholar 

  7. Ciborra, C. (2000). From Control to Drift, Oxford University Press, Oxford, UK.

    Google Scholar 

  8. Dourish, P., Grinter, R. E., Delgado de la Flor, J., and Joseph, M. (2004). Security in the wild: User strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing, 8(6), 391-401.

    Article  Google Scholar 

  9. Sasse, M. A., Brostoff, S., and Weirich, D. (2001). Transforming the ‘weakest link’ - a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3),122-131

    Article  Google Scholar 

  10. Jensen, C., Potts, C., and Jensen, C. (2005). Privacy practices of Internet users: Self-reports versus observed behaviour. International Journal of Human-Computer Studies, 63, 203-227

    Article  Google Scholar 

  11. Mitnick, K. D. (2003). The Art of Deception, Wiley, New York

    Google Scholar 

  12. Schneier, B. (2006). Beyond Fear, Thinking Sensibly About Security in an Uncertain World, Wiley, NY

    Google Scholar 

  13. Karat, C.-M. (1989). Iterative usability testing of a security application. Proceedings of the Human Factors Society, Denver, Colorado, 273-277.

    Google Scholar 

  14. Karat, J., Karat, C.-M., Brodie, C., and Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies, 63, 153-174.

    Article  Google Scholar 

  15. Roth, V., Straub, T., and Richter, K. (2005). Security and usability engineering with particular attention to electronic mail. International Journal of Human-Computer Studies, 63, 51-63.

    Article  Google Scholar 

  16. Anderson, R. (2001), Security Engineering: A comprehensive Guide to Building Dependable Distributed Systems, Wiley, New York.

    Google Scholar 

  17. Anderson, R. (1993). Why cryptosystems fail. Conference on Computer and Communications Security, Proceedings of the 1st ACM Conference on Computer and communications security, 215-227.

    Google Scholar 

  18. Anderson, R. (2001). Why information security is hard: An economic perspective. Seven-teenth Computer Security Application Conference, 358-365.

    Google Scholar 

  19. Gallino, L. (1984). Mente, comportamento e intelligenza artificiale, Comunit à , Milano.

    Google Scholar 

  20. Baskerville, R. (1993). Research notes: Research directions in information systems security. International Journal of Information Management, 7(3), 385-387.

    Google Scholar 

  21. Baskerville, R. (1995). The Second Order Security Dilemma, Information Technology and Changes in Organizational Work. Chapman and Hall, London.

    Google Scholar 

  22. Hardee, J. B., Mayhorn, C. B., and West, R. T. (2006). To download or not to download: An examination of computer decision making, interactions. Special Issue on HCI & Security, May-June, 32-37.

    Google Scholar 

  23. Hardee, J. B., Mayhorn, C. B., and West, R. T. (2001). You downloaded WHAT? Computer-based security decisions. 50th Annual Meeting of the Human Factors and Ergonomics Society. Santa Monica, CA.

    Google Scholar 

  24. March, J. G. and Simon, H. A. (1958). Organizations. Wiley, New York, NY

    Google Scholar 

  25. Dhamija, R.(2006). Why phishing works. Proceedings of CHI, Montreal, Quebec, Canada, 581-590

    Google Scholar 

  26. Schultz, E. E., Proctor, R. W., Lien, M. C., and Salvendy, G. (2001). Usability and security: An appraisal of security issues in information security methods. Computers and Security, 20(7),620-634

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Physica-Verlag Heidelberg

About this paper

Cite this paper

Cavallari, M. (2008). Human–Computer Interaction and Systems Security: An Organisational Appraisal. In: Interdisciplinary Aspects of Information Systems Studies. Physica-Verlag HD. https://doi.org/10.1007/978-3-7908-2010-2_32

Download citation

Publish with us

Policies and ethics