BYOD security: using dual process theory to adapt effective security habits in BYOD

Roger Zhang, Abubakar Bello, Jeffrey L Foster

Research output: Contribution to conferencePaperpeer-review

Abstract

Bring Your Own Device (BYOD) culture has evolved rapidly in the past years. However, with the increased mobile device usage at home and work environments, security and privacy risks have also increased. Malware, social engineering and phishing threats have been adapted to the new technology in order to infiltrate and take control over these personal devices. With human error being the root cause of most successful BYOD attacks, this study looks at applying a psychological perspective to shed light on this issue by applying Dual Process Theory (DPT) and investigating which System of Thinking is more effective in making healthy cyber security decisions. A quantitative study using a within-subjects group method completed a two-paradigm phishing email sorting task. The results showed that system-1 and system-2 thinking did not have significantly different results. This indicates that new security measures focusing on both system-1 and system-2 thinking should be developed to improve BYOD security habits. Individuals should be given more training and/or spend more time analysing security threats in order to maintain effective BYOD cyber-security practices. This study hopes to encourage future research in order to help develop psychologically backed methods to improve BYOD security.
Original languageEnglish
Pages372-386
Number of pages15
DOIs
Publication statusPublished - 13 Oct 2022
EventProceedings of the Future Technologies Conference (FTC) 2022 - Vancouver, Canada
Duration: 20 Oct 202221 Oct 2022
https://link.springer.com/conference/ftc

Conference

ConferenceProceedings of the Future Technologies Conference (FTC) 2022
Abbreviated titleFTC 2022
Country/TerritoryCanada
CityVancouver
Period20/10/2221/10/22
Internet address

Keywords

  • BYOD
  • Dual Process Theory
  • Cyber Security
  • Human error

Fingerprint

Dive into the research topics of 'BYOD security: using dual process theory to adapt effective security habits in BYOD'. Together they form a unique fingerprint.

Cite this