کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
464697 697389 2016 16 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Modeling and analysis of influence power for information security decisions
ترجمه فارسی عنوان
مدل سازی و تجزیه و تحلیل قدرت نفوذ برای تصمیم گیری در مورد امنیت اطلاعات
کلمات کلیدی
امنیت اطلاعات، تعادل امنیت و بهره وری، تجزیه و تحلیل تصمیمات چندگانه رفتار تحت تاثیر، پوسیدگی تأثیر قدرت
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Users of computing systems and devices frequently make decisions related to information security, e. g., when choosing a password, deciding whether to log into an unfamiliar wireless network. Employers or other stakeholders may have a preference for certain outcomes, without being able to or having a desire to enforce a particular decision. In such situations, systems may build in design nudges to influence the decision making, e. g., by highlighting the employer’s preferred solution. In this paper we model influencing information security to identify which approaches to influencing are most effective and how they can be optimized. To do so, we extend traditional multi-criteria decision analysis models with modifiable criteria, to represent the available approaches an influencer has for influencing the choice of the decision maker. The notion of influence power is introduced to characterize the extent to which an influencer can influence decision makers. We illustrate our approach using data from a controlled experiment on techniques to influence which public wireless network users select. This allows us to calculate influence power and identify which design nudges exercise the most influence over user decisions.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Performance Evaluation - Volume 98, April 2016, Pages 36–51
نویسندگان
, , ,