Resistance behavior

Assignment Help Basic Computer Science
Reference no: EM132892356

Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as "resistance behavior," a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don't work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.

If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?

In the same scenario, what kind of incentive do you think would encourage the user to participate?

Reference no: EM132892356

Questions Cloud

Determine the amount of share from jayme net income : Determine the amount of "Share from Jayme's Net Income" to be reported in the 2014 and 2015 income statement of Vicky and Val Company, respectively.
Why does etihad airways establish alliances : Why does Etihad Airways establish alliances with so many partners?
Develop a product strategy-pricing-promotion strategy : You will need to, develop a product strategy, pricing, and promotion strategy. You will also need to conduct a competitive pricing analysis, determine your prom
Measure satisfaction level with practice : A physician with a practice is currently serving 280 patients. The physician would like to administer a survey to his patients to measure their satisfaction lev
Resistance behavior : Referred to as "resistance behavior," Virginia Tech study found that even if people understand that security breach can have severe consequences on organization
What is the usefulness of accrual accounting in improving : What is usefulness of accrual accounting in improving financial statement analysis. Analysis usefulness of accrual accounting in improving financial statement
Difference between intentional and unintentional threats : Analyze the difference between intentional and unintentional threats.
What is the npv for abx inc : Adjustment factor of -1% to the overall cost of capital for similar projects. If the project requires an initial investment of $20 million, what is the NPV?
Address issues in a health care organization : Write on how personal mission statement and statement of career objectives reveal skills and competencies in the field of health care administration.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Access database that contains tables with relationships

Using Microsoft Access, how do you design an access database that contains tables with relationships, that is in 3rd normal form?

  What are the types of password attacks

What is the difference between a denial-of-service attack and a distributed denial-of-service attack? Which is more dangerous? Why?

  Computer crimes directions

Computer Crimes Directions: Using the internet, research a specific case of a computer crime where a person was prosecuted for committing a computer crime. Write an essay about this crime. Your essay should include the following:Explain the computer ..

  Develop an intake briefing for a group of software engineers

Develop an "intake" briefing for a group of software engineers who have been tasked with developing a standard set of security review processes for virtual team

  Why did the upgrade to ipv6 occur

Why did the upgrade to IPv6 occur? and When do you think all networks will have to be IPv6?

  Negative number at which time the program ends

The program should repeat until the user enters a negative number at which time the program ends.

  What is the sum after the following loop terminates

What is the sum after the following loop terminates

  Finding ideal health care career

Will a BSHA program and any of the certificate assist a student in finding their ideal Health Care career?

  Pride salesperson who says

Suppose you are a health club owner and you are approached by a PRIDE salesperson who says, "The PRIDE database is located in an XYZ cloud facility

  Develop policy for optimizing bus and local train schedules

Describe how these tools could be used to develop policy for optimizing bus and local train schedules to minimize energy use and passenger wait times.

  Describe an application

Can you compare the two? 3.Class templates are typically used to replace overloaded functions. Can you compare the two?

  Consider when purchasing and installing a ups

Mary Ann would like you to first learn about some of the important features to consider when purchasing and installing a UPS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd