dc.contributor.author | Siponen, Mikko | |
dc.contributor.author | Puhakainen, Petri | |
dc.contributor.author | Vance, Anthony | |
dc.date.accessioned | 2019-10-17T08:22:50Z | |
dc.date.available | 2019-10-17T08:22:50Z | |
dc.date.issued | 2020 | |
dc.identifier.citation | Siponen, M., Puhakainen, P., & Vance, A. (2020). Can Individuals’ Neutralization Techniques Be Overcome? : A Field Experiment on Password Policy. <i>Computers and Security</i>, <i>88</i>, Article 101617. <a href="https://doi.org/10.1016/j.cose.2019.101617" target="_blank">https://doi.org/10.1016/j.cose.2019.101617</a> | |
dc.identifier.other | CONVID_33002860 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/65920 | |
dc.description.abstract | Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations.
Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations can be changed through educational training interventions. We argue that training based on principles of cognitive dissonance theory is a promising method for reducing individuals’ use of neutralization techniques. We contribute by showing empirically that training based on cognitive dissonance theory can reduce the use of neutralization techniques when such training is designed to counter such techniques.
Using a quasi-experimental design at an organization, individuals received training on neutralization techniques in the context of password security. Using a quasi-experimental design, we found that individuals who received our training treatment exhibited substantially less intent to use neutralization techniques and were significantly more likely to use secure passwords. Additionally, a follow-up measurement three weeks after the training session showed that the experimental treatment retained its effectiveness, i.e., the experimental group exhibited substantially less intent to use neutralization techniques and a greater likelihood of using strong passwords in the future. Additionally, intent was significantly greater in the experimental group. Implications for practice and future research are discussed. | en |
dc.format.mimetype | application/pdf | |
dc.language | eng | |
dc.language.iso | eng | |
dc.publisher | Elsevier Advanced Technology | |
dc.relation.ispartofseries | Computers and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | information security policy | |
dc.subject.other | passwords | |
dc.subject.other | neutralization | |
dc.subject.other | information security | |
dc.title | Can Individuals’ Neutralization Techniques Be Overcome? : A Field Experiment on Password Policy | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-201910174492 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 0167-4048 | |
dc.relation.volume | 88 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2019 Elsevier Ltd. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.relation.grantnumber | 1732/31/2015 | |
dc.subject.yso | tietoturva | |
dc.subject.yso | henkilöstökoulutus | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | salasanat | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p296 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21231 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.1016/j.cose.2019.101617 | |
dc.relation.funder | TEKES | en |
dc.relation.funder | TEKES | fi |
jyx.fundinginformation | The Finnish Funding Agency for Innovation (Business Finland) and several companies funded this study. | |
dc.type.okm | A1 | |