1.34k likes | 1.35k Vues
Explore the applications of the scenario method in information security, managing expectations, and the growing use of the factorial survey method in decision-making situations. This study delves into a scenario where John, a low-level manager, is faced with a dilemma of sharing his password at his workplace despite strict security policies. Understand factors influencing decision-making and social norms in such situations.
E N D
The Factorial Survey Method: Applications for Information Security Research • Anthony Vance
John is a low-level manager in a small company where he was recently hired. His company has a strong policy that each computer workstation must be password-protected and that passwords are not to be shared.
However, John is on a business trip and one of his co-workers needs a file on his computer. John expects that sharing his password could save his company a lot of time.
He also knows that the firm has mandatory information security training. John shares his password with his co-worker.
What is the likelihood you would do as John did in the described scenario?
‘‘The methodological gold standard’’ for the study of social norms in decision making situations”(Sorenson and Taylor 2003, p. 79)
John is a low-level manager in a small company where he was recently hired. His company has a strong policy that...
John is a low-level manager in a small company where he was recently hired. His company has a strong policy that...
Jessica is a mid-level manager in a large company where she was recently hired. Her company has a strong policy that...
Jessica is a low-level employee in a large company where she has worked for several years. Her company has an informal policy that...
John is a high-level executive in a large company where he has worked for several years. His company has no information security policy...
Peter Rossi 1921-2006
“Students take their professors’ remarks more seriously than the professors often do and remember them better.”