Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-10 Number-4
Year of Publication : 2014
Authors : Hani A. Qudaih , Mohammed A. Bawazir , Shuaibu Hassan Usman , Jamaludin Ibrahim
DOI :  10.14445/22312803/IJCTT-V10P131

MLA

Hani A. Qudaih , Mohammed A. Bawazir , Shuaibu Hassan Usman , Jamaludin Ibrahim."Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization". International Journal of Computer Trends and Technology (IJCTT) V10(4):180-186, Apr 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Persuasion is part and parcel of human interaction. The human persuaders in society have been always exit, masters of rhetoric skilled of changing our minds, or at least our behaviors. Leaders, mothers, salesmen, and teachers are clear examples of persuaders. Persuaders often turn to technology and digital media to amplify their persuasive ends. Besides, our lives and how we lead them influenced by technologies and digital media, but for the most part, their effects on our attitudes and behaviors have been incidental, even accidental. Although, nowadays, the use of computers to sell products and services considered as the most frequent application of persuasive technology. In this short paper, based on an extensive review of literatures, we aim to give a brief introduction to persuasive technology, and how it can play a role and contribute to enhance and deliver the best practice of IT. Some challenges of persuasive technology have been discussed. At the end, some recommendations and steps should be taken place to empower IT professional practices have been listed.

References
[1] S. Northcutt, "MGT438: How to Establish a Security Awareness Program," 2014. [Online]. Available: http://www.sans.org/ course/establish-security-awareness-program. [Accessed 08 April 2014].
[2] A. Wolmarans, "Implementing an Effective Information Security Awareness Program," UJ Library and Information Centre, Johannesburg, 2003.
[3] M. Wilson, "Information Technology Security Training Requirements: A Role- and Performance-Based Model," National Institute of Standards and Technology, Washington, DC, 1998.
[4] M. Wilson and J. Hash, Building an Information Technology Security Awareness and Training Program, Washington, DC: National Institute of Standards and Technology (NIST), 2003, pp. 1-70.
[5] A. Forget, S. Chiasson and R. Biddle, "Persuasion as education for computer security," in World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Chicago, 2007.
[6] T. R. Peltier, "Implementing an Information Security Awareness Program," Security Mnagement Practices, pp. 37-49, June 2005.
[7] S. S. Ferebee, "Successful persuasive technology for behavior reduction: mapping to fogg’s gray behavior grid," Persuasive Technology. Springer Berlin Heidelberg, pp. 70-81, 2010.
[8] B. Reeves and C. Nass, "ow people treat computers, television, and new media like real people and places," CSLI Publications and Cambridge university press, Cambridge, 1996.
[9] Y. Tian, "Design of a persuasive recommendation agent to promote environmentally friendly products," UBC Library, Vancouver, 2012.
[10] H. F. Tipton and M. Krause, Information security management handbook, Illinois: CRC Press, 2004.
[11] W. Trotter and T. Creasey, "Role of Internal Consultants in managing change," 27 April 2008. [Online]. Available: http://www.change-management.com/ tutorial-internal-consultants.htm.
[12] S. Hinde, "Security surveys spring crop," Elsevier, pp. 310-321, 2002.
[13] I. Wijnand, Y. de Kort, C. Midden and E. van den Hoven, "Persuasive Technology for Human Well-Being: Setting the Scene," In Persuasive technology, pp. 1-5, 2006.
[14] B. J. Fogg, "A Behavior Model for Persuasive Design," in Persuasive’09, Claremont, California, 2009.
[15] P. Zimbardo and M. Leippe, The Psychology of Attitude Change and Social Influence, New York: McGraw-Hill, 1991.
[16] B. J. Fogg, "Persuasive Computers: Perspectives and Research Directions," ACM Inc., Los Angeles, 1998.
[17] B. Schneiderman, Designing the User Intelface, New York: Addison Wesle, 1987.
[18] B. N. C. Reeves, "The Media Equation: How people treat computers, television, and new media like real people and places," Cambridge University Pres, New York, 1996.
[19] B. Fogg, Persuasive Technology: Using Computers to Change What We Think and Do, San Francisco: Morgan Kaufmann Publishers, 2003.
[20] ENISA, The New Users’ Guide: How to Raise Information Security Awareness, Heraklion: The European Network and Information Security Agency (ENISA), 2010.
[21] W. King, M. Dent and E. Miles, "The persuasive effect of graphics in computer-mediated communication," Computers in Human Behavior, vol. 7, no. 4, pp. 269-279, 1991.

Keywords
Persuasive Technology, consultants, Information Security, Information Security Awareness