Modeling and analysis of influence power for information security decisions
Users of computing systems and devices frequently make decisions related to information security, e. g., when choosing a password, deciding whether to log into an unfamiliar wireless network. Employers or other stakeholders may have a preference for certain outcomes, without being able to or having a desire to enforce a particular decision. In such situations, systems may build in design nudges to influence the decision making, e. g., by highlighting the employer’s preferred solution. In this paper we model influencing information security to identify which approaches to influencing are most effective and how they can be optimized. To do so, we extend traditional multi-criteria decision analysis models with modifiable criteria, to represent the available approaches an influencer has for influencing the choice of the decision maker. The notion of influence power is introduced to characterize the extent to which an influencer can influence decision makers. We illustrate our approach using data from a controlled experiment on techniques to influence which public wireless network users select. This allows us to calculate influence power and identify which design nudges exercise the most influence over user decisions.
Citation : Yevseyeva, I., Morisset, C., van Moorsel, A. (2016) Modeling and analysis of influence power for information security decisions. Performance Evaluation, 98, pp. 36-51
Research Group : Cyber Security Centre
Research Institute : Cyber Technology Institute (CTI)
Peer Reviewed : Yes