Feature
Jumping security hurdles

https://doi.org/10.1016/S1361-3723(10)70067-1Get rights and content

It is widely recognised that success in tackling security issues often depends upon acknowledgement and action by individuals. To quote Amit Yoran, erstwhile director of the National Cyber Security Division within the US Department of Homeland Security: “The human factor is typically the most critical variable in information security systems. Even the best policies and technologies can be rendered completely ineffective if users do not take responsibility for safeguarding the information they control”.1 With this in mind, it is worth asking what stands in the way of users doing what is required of them.

Section snippets

Hurdles facing the user

The perceived hurdles are summarised below, with the points in brackets essentially representing the questions that users need to ask themselves in order to overcome the challenge:

Perception (what is it?): how threats and their associated security measures are viewed by those that they affect. If users do not understand how threats relate to them, or dislike the idea of particular forms of security (eg, monitoring measures), then this can present an immediate barrier to effective usage.

In many

Doing something about it

As presented here, the latter three hurdles all relate back to aspects of the same underlying question. This reflects the fact that, past a certain point, success means that users need not only to acknowledge and accept security issues, but to be able to do something about them.

The overall process is shown diagrammatically in Figure 1, noting that this applies to security as a broad issue as well as to the handling of each individual threat or control that users are expected to face. The layout

Jumping the hurdles

Different solutions need different actions, and often from different actors. For example, many parties – including vendors, service providers, government, etc – can improve user perceptions, but the hurdles of priority (and potentially responsibility) are perhaps more personal issues, which users themselves need to consider. However, here, others can at least assist users' thinking (eg, by highlighting the things that will not be done for them by anyone else).

In terms of practical strategies,

Conclusions

The discussion has identified a range of hurdles that need to be overcome in getting individual users to a point where they can accept and act upon their security responsibilities. Although some level of success can still be achieved without this (eg, legislative requirements may oblige users to follow certain security practices regardless of whether they accept personal responsibility or not), progression towards a true security culture is much more likely if all of the foundations have been

About the author

Professor Steven Furnell is the head of the Centre for Security, Communications & Network Research at the University of Plymouth, UK, and an adjunct professor with Edith Cowan University in Western Australia. His interests include security management and culture, computer crime, user authentication and security usability. Furnell is active within three working groups of the International Federation for Information Processing (IFIP) – namely Information Security Management,

References (11)

  • S Furnell et al.

    ‘Security beliefs and barriers for novice Internet users’

    Computers & Security

    (2008)
  • Kawamoto, D. 2004. ‘Human Firewall gets new owner’, CNET News, 25 June...
  • Symantec. 2010. Symantec Internet Security Threat Report – Trends for 2009, Volume XV, Symantec Enterprise Security,...
  • Atkinson, S, Furnell, S and Phippen, A 2009. ‘Securing the next generation: enhancing e-safety awareness among young...
  • BBC. 2010. ‘Facebook privacy settings to be made simpler’, BBC News Online, 26 May...
There are more references available in the full text version of this article.

Cited by (14)

View all citing articles on Scopus

About the author

Professor Steven Furnell is the head of the Centre for Security, Communications & Network Research at the University of Plymouth, UK, and an adjunct professor with Edith Cowan University in Western Australia. His interests include security management and culture, computer crime, user authentication and security usability. Furnell is active within three working groups of the International Federation for Information Processing (IFIP) – namely Information Security Management, Information Security Education, and Human Aspects of Information Security & Assurance. He is the author of over 190 papers in refereed international journals and conference proceedings, as well as books including: Cybercrime: Vandalizing the Information Society (2001); and Computer Insecurity: Risking the System (2005). Further details can be found at www.plymouth.ac.uk/cscan.

View full text