In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in ...
The consumerization of information technology is one of the biggest trends occurring in the informat...
Advancements in information technology often task users with complex and consequential privacy and s...
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile d...
In this work we address the main issues of Information Technology (IT) consumerisation that are rela...
In this work we address the main issues of Information Technology (IT) consumerization that are rela...
AbstractIn this work we address the main issues of IT consumerisation that are related to security r...
This report presents security policies that can be deployed to mitigate risks that are related with ...
This report presents security policies that can be deployed to mitigate risks that are related with ...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, t...
While highly sensitive data like personal health information (PHI) is valuable to digital health ser...
Nudging is a promising approach, in terms of influencing people to make advisable choices in a range...
High-profile cybersecurity incidents, such as the 2019 Capital One data breach and the 2017 Equifax ...
There has recently been an upsurge of interest in the deployment of behavioural economics techniques...
In light of prominent data leaks and a surge of civilian surveillance systems, information service p...
The consumerization of information technology is one of the biggest trends occurring in the informat...
Advancements in information technology often task users with complex and consequential privacy and s...
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile d...
In this work we address the main issues of Information Technology (IT) consumerisation that are rela...
In this work we address the main issues of Information Technology (IT) consumerization that are rela...
AbstractIn this work we address the main issues of IT consumerisation that are related to security r...
This report presents security policies that can be deployed to mitigate risks that are related with ...
This report presents security policies that can be deployed to mitigate risks that are related with ...
Information technology security policies are designed explicitly to protect IT systems. However, ove...
This research focuses on bring your own device (BYOD), i.e., the use of personal devices (laptops, t...
While highly sensitive data like personal health information (PHI) is valuable to digital health ser...
Nudging is a promising approach, in terms of influencing people to make advisable choices in a range...
High-profile cybersecurity incidents, such as the 2019 Capital One data breach and the 2017 Equifax ...
There has recently been an upsurge of interest in the deployment of behavioural economics techniques...
In light of prominent data leaks and a surge of civilian surveillance systems, information service p...
The consumerization of information technology is one of the biggest trends occurring in the informat...
Advancements in information technology often task users with complex and consequential privacy and s...
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile d...