BYOD security: using dual process theory to adapt effective security habits in BYOD

Roger Zhang, Abubakar Bello*, Jeffrey L. Foster

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

Bring Your Own Device (BYOD) culture has evolved rapidly in the past years. However, with the increased mobile device usage at home and work environments, security and privacy risks have also increased. Malware, social engineering and phishing threats have been adapted to the new technology in order to infiltrate and take control over these personal devices. With human error being the root cause of most successful BYOD attacks, this study looks at applying a psychological perspective to shed light on this issue by applying Dual Process Theory (DPT) and investigating which System of Thinking is more effective in making healthy cyber security decisions. A quantitative study using a within-subjects group method completed a two-paradigm phishing email sorting task. The results showed that system-1 and system-2 thinking did not have significantly different results. This indicates that new security measures focusing on both system-1 and system-2 thinking should be developed to improve BYOD security habits. Individuals should be given more training and/or spend more time analysing security threats in order to maintain effective BYOD cyber-security practices. This study hopes to encourage future research in order to help develop psychologically backed methods to improve BYOD security.
Original languageEnglish
Title of host publicationProceedings of the Future Technologies Conference (FTC) 2022, Volume 2
EditorsKohei Arai
Place of PublicationCham, Switzerland
PublisherSpringer, Springer Nature
Pages372-386
Number of pages15
ISBN (Electronic)9783031184581
ISBN (Print)9783031184574
DOIs
Publication statusPublished - 2023
Externally publishedYes
EventFuture Technologies Conference (7th : 2022) - virtual
Duration: 20 Oct 202221 Oct 2022

Publication series

NameLecture Notes in Networks and Systems
PublisherSpringer
Volume560
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceFuture Technologies Conference (7th : 2022)
Abbreviated titleFTC 2022
Period20/10/2221/10/22

Keywords

  • BYOD
  • Dual Process Theory
  • Cyber security
  • Human error

Fingerprint

Dive into the research topics of 'BYOD security: using dual process theory to adapt effective security habits in BYOD'. Together they form a unique fingerprint.

Cite this