TitleInfoSec Process Action Model (IPAM): Targeting Insider’s Weak Password Behavior
Publication TypeJournal Articles
Year of Publication2019
AuthorsCurry, M, Marshall, B, Correia, J, Crossler, RE
JournalJournal of Information Systems
Volume33
Issue3
Pagination201-225
Date Published2019
KeywordsAccounting, BIS
Abstract

The possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating compliance behavior with control expectations from 47 percent to 60 percent. Importantly, the model constructs offer measurable indications despite practical limitations on organizations' ability to assess problematic individual password behavior. A threefold increase in one measure of strong password behavior suggested the process positively impacted individual cybersecurity behavior. The results suggest that the process-nuanced IPAM approach is promising both for assessing and impacting security compliance behavior.

URLhttps://doi.org/10.2308/isys-52381
Sort

a