1 / 134

The Factorial Survey Method: Applications for Information Security Research

Explore the applications of the scenario method in information security, managing expectations, and the growing use of the factorial survey method in decision-making situations. This study delves into a scenario where John, a low-level manager, is faced with a dilemma of sharing his password at his workplace despite strict security policies. Understand factors influencing decision-making and social norms in such situations.

altonm
Download Presentation

The Factorial Survey Method: Applications for Information Security Research

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Factorial Survey Method: Applications for Information Security Research • Anthony Vance

  2. Variant of scenario method

  3. Advantages

  4. Applications to IS security

  5. Manage expectations

  6. Growing use of the scenario method

  7. John is a low-level manager in a small company where he was recently hired. His company has a strong policy that each computer workstation must be password-protected and that passwords are not to be shared.

  8. However, John is on a business trip and one of his co-workers needs a file on his computer. John expects that sharing his password could save his company a lot of time.

  9. He also knows that the firm has mandatory information security training. John shares his password with his co-worker.

  10. What is the likelihood you would do as John did in the described scenario?

  11. Factorial Survey

  12. Variation

  13. ‘‘The methodological gold standard’’ for the study of social norms in decision making situations”(Sorenson and Taylor 2003, p. 79)

  14. John is a low-level manager in a small company where he was recently hired. His company has a strong policy that...

  15. John is a low-level manager in a small company where he was recently hired. His company has a strong policy that...

  16. Jessica is a mid-level manager in a large company where she was recently hired. Her company has a strong policy that...

  17. Jessica is a low-level employee in a large company where she has worked for several years. Her company has an informal policy that...

  18. John is a high-level executive in a large company where he has worked for several years. His company has no information security policy...

  19. History

  20. Peter Rossi 1921-2006

  21. “Students take their professors’ remarks more seriously than the professors often do and remember them better.”

  22. Theory

  23. People constantly make decisions

  24. People have more or less fixed preferences

  25. Biological

  26. Cultural

  27. Idiosyncratic

  28. Shared > Idiosyncratic

  29. Judgments

  30. Normative structures

  31. Weights

  32. Which weights have most influence on a judgment?

  33. Two classes of weights

  34. Socially-agreed upon

  35. Individual deviations

  36. Underlying structure

  37. Riv = β0i + ∑βkiXkiv + εiv

  38. Hybrid

  39. Experiments

  40. Balanced factorial design

  41. Survey

  42. Sampling

More Related