Applying the Lost-Letter Technique to Assess IT Risk Behaviour
|Title||Applying the Lost-Letter Technique to Assess IT Risk Behaviour|
|Publication Type||Conference Paper|
|Year of Publication||2013|
|Authors||Lastdrager E.EH, Montoya L., Hartel P.H, Junger M.|
|Conference Name||Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, New Orleans, USA|
|Publisher||IEEE Computer Society|
Information security policies are used to mitigate threats for which a technical prevention is not feasible. Compliance with information security policies is a notoriously difficult issue. Social sciences could provide tools to empirically study compliance with policies. We use a variation of the lost-letter technique to study IT risk behaviour, using USB keys instead of letters. The observational lost-letter study by Farrington and Knight (1979) was replicated in a university setting by dropping 106 USB keys. Labels on the USB keys were used to vary characteristics of the alleged victim. Observers noted characteristics of people who picked a USB key up and whether the USB key was returned. Results show that USB keys in their original box are stolen more than used ones and that people aged 30 or younger and those who place a found USB key in their pocket are more likely to steal. This suggests that the decision to steal a USB key is taken at the moment of pick up, despite ample opportunity to return it. The lost USB key technique proved to be a feasible method of data collection to measure policy compliance and thus also risk behaviour.