CHAPTER 50
USING SOCIAL PSYCHOLOGY TO IMPLEMENT SECURITY POLICIES
M. E. Kabay, Bridgitt Robertson, Mani Akella, and D. T. Lang
50.2 RATIONALITY IS NOT ENOUGH
50.2.2 Theories of Personality
50.2.3 Explanations of Behavior
50.2.5 Intercultural Differences
50.2.7 Getting Your Security Policies Across
50.2.8 Reward versus Punishment
50.3.3 Changing Attitudes toward Security
50.4.2 Conformity, Compliance, and Obedience
50.6 TECHNOLOGICAL GENERATION GAPS
50.7 SUMMARY OF RECOMMENDATIONS
50.1 INTRODUCTION1.
Most security personnel have commiserated with colleagues about the difficulty of getting people to pay attention to security policies—to comply with what seems like good common sense. They shake their heads in disbelief as they recount tales of employees who hold secured doors open for their workmates—or for total strangers, thereby rendering million-dollar card-access systems useless. In large organizations, upper managers who decline to wear their identification badges discover that soon no one else will either. In trying to implement security policies, practitioners sometimes feel that they are involved in turf wars and personal vendettas rather ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.