Controlling information behaviour: the case for access control

Paul A. Watters*, Jacqueline Ziegler

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Citations (Scopus)

Abstract

Intentional dissemination of information is a key role of information systems. Yet methods for controlling access to information - as opposed to data - are still in their infancy, especially in relation to the key decision points' that need to be made regarding what information users can access when, and under what conditions. This paper presents the case for access control to be explicitly integrated into models of information behaviour, especially as they relate to information access on the relatively unregulated internet. An observational case study relating to information access in Indonesia - which is a highly regulated society - is presented, through advertising on rogue websites - in this case, behaviour which is strictly regulated in the physical world (such as the promotion of gambling) is relatively unchecked online; the absence of effective controls, as suggested by situational crime prevention theory [Clarke, R. V. G., ed. 1997. Situational Crime Prevention. Criminal Justice Press] is reflected in the high levels of offending seen online. The extent to which information systems can manage information-seeking behaviour in a way that is consistent with regulatory or policy requirements in the online environment is discussed, with a view to establishing a foundation and terminology to modify information behaviour theory for the online environment.

Original languageEnglish
Pages (from-to)268-276
Number of pages9
JournalBehaviour and Information Technology
Volume35
Issue number4
DOIs
Publication statusPublished - 2016
Externally publishedYes

Keywords

  • behaviour modelling
  • information security
  • information security behaviours
  • search engine
  • threat control model
  • user psychology

Fingerprint

Dive into the research topics of 'Controlling information behaviour: the case for access control'. Together they form a unique fingerprint.

Cite this