Psychological theories and their applicability in resolving issues with unauthorised computer access

Masters Thesis


Howard, Angela A. M.. 2011. Psychological theories and their applicability in resolving issues with unauthorised computer access. Masters Thesis Master of Business (Research). University of Southern Queensland.
Title

Psychological theories and their applicability in resolving issues with unauthorised computer access

TypeMasters Thesis
Authors
AuthorHoward, Angela A. M.
SupervisorGururajan, Raj
Hafeez-Baig, Abdul
Institution of OriginUniversity of Southern Queensland
Qualification NameMaster of Business (Research)
Number of Pages186
Year2011
Abstract

Literature has shown that technical solutions are not completely successful in securing information systems from intruders. Previous attempts to develop hacker profiles are still incomplete and time consuming to apply. Prior studies in social engineering and expectancy theory have shown that they can address some of the issues organisations are encountering, especially in employees disclosing sensitive organisational data. Therefore, using these studies in an organisational context may provide clues to how the disclosure of information can be contained. This aspect was posited in the main research question:

How can education affect the process of preventing social engineering to minimise the success of unauthorised intrusion?

While answering the main research question, due to time constraints, this study focussed only on social engineering as the main cause of disclosing organisational data. This aspect was determined using psychological theories and their applicability in resolving issues with unauthorised computer access. Qualitative approach was used as the main data collection technique and two focus groups were employed in collecting data. The University of Southern Queensland was used as the case organisation and suitable samples were drawn for a 2 x 90‐minute focus group sessions. The qualitative data were analysed using two prominent text analysis applications, namely, Leximancer 3.5 and NVivo 8.

This qualitative data analysis identified 5 crucial themes. These themes are security awareness, unauthorised access, social engineering, policies and procedures, and education. It is inferred from the data that changes in the way policies and procedures implemented can have marked improvement in security aspects, especially in containing the leakage of organisational data. Thus, this research can assert that a change in policies and procedures can have an impact on unauthorised access.

New findings of the study include that staff are proactively looking for more secure ways in their processing and creating new procedures as they go, and that there seems to be a disconnect between access to information systems and the organisational data. Future research can expand on the model created for this research and focus on expectancy theory as well as quantitative methodology so that outcomes can be generalised.

Keywordsunauthorised computer access; psychological theories; applicability; University of Southern Queensland;
ANZSRC Field of Research 2020469999. Other information and computing sciences not elsewhere classified
Byline AffiliationsSchool of Information Systems
Permalink -

https://research.usq.edu.au/item/q1v98/psychological-theories-and-their-applicability-in-resolving-issues-with-unauthorised-computer-access

Download files


Published Version
Howard_2011_whole.pdf
File access level: Anyone

  • 1948
    total views
  • 1068
    total downloads
  • 4
    views this month
  • 1
    downloads this month

Export as

Related outputs

Becoming a female leader in higher education: investigations from a regional university
Redmond, Petrea, Gutke, Hannah, Galligan, Linda, Howard, Angela and Newman, Tara. 2017. "Becoming a female leader in higher education: investigations from a regional university." Gender and Education. 29 (3), pp. 332-351. https://doi.org/10.1080/09540253.2016.1156063
A framework for the adoption of wireless technology in healthcare: an Indian study
Howard, Angela, Hafeez-Baig, Abdul, Howard, Srecko and Gururajan, Raj. 2006. "A framework for the adoption of wireless technology in healthcare: an Indian study." Spencer, S. and Jenkins, A. (ed.) 17th Australasian Conference on Information Systems (ACIS 2006). Adelaide, Australia 06 - 08 Dec 2006 Australia.
The problems of implementing electronic signatures in a wireless environment
Gururajan, Raj and Howard, Angela. 2004. "The problems of implementing electronic signatures in a wireless environment." 9th Annual Conference of Asia Pacific Decision Sciences Institute (APDSI 2004). Seoul, Korea 01 - 04 Jul 2004 Hong Kong, China.
The energy inefficiency of office computing and potential emerging technology solutions
Lane, Michael S., Howard, Angela and Howard, Srecko. 2009. "The energy inefficiency of office computing and potential emerging technology solutions." Issues in Informing Science and Information Technology. 6, pp. 795-808.
Wireless emails: issues, challenges and guidelines for implementation
Howard, Angela, Low, Ee Kuan, Byrnes, Peter and Gururajan, Raj. 2004. "Wireless emails: issues, challenges and guidelines for implementation." Conrick, Moya and Soar, Jeffrey (ed.) 1st Australian Aged and Community Care Informatics Conference (ACCIC'04). Brisbane, Australia 24 - 25 Aug 2004 Brunswick East, Vic, Australia.
Traffic behaviour of VoIP in a simulated access network
Das Gupta, Jishu, Howard, Srecko and Howard, Angela. 2006. "Traffic behaviour of VoIP in a simulated access network." International Transactions on Engineering, Computing and Technology. 18, pp. 189-194.