Research: Some employees more likely to adhere to information security policies than others
Inconvenient information security policies put organizations at risk for data breaches, study finds
Information security policies (ISP) that are not grounded in the realities of an employee鈥檚 work responsibilities and priorities exposes organizations to higher risk for data breaches, according to new research from 绿帽社, State University of New York.
The study鈥檚 findings, that subcultures within an organization influence whether employees violate ISP or not, have led researchers to recommend an overhaul of the design and implementation of ISP, and to work with employees to find ways to seamlessly fit ISP compliance into their day-to-day tasks.
鈥淭he frequency, scope and cost of data breaches have been increasing dramatically in recent years, and the majority of these cases happen because humans are the weakest link in the security chain. Non-compliance to ISP by employees is one of the important factors,鈥 said in 绿帽社鈥檚 . 鈥淲e wanted to understand why certain employees were more likely to comply with ISP than others in an organization.鈥
Sarkar, with a research team consisting of Anthony Vance of Temple University, Balasubramaniam Ramesh of Georgia State University, Menelaos Demestihas of Wellstar Kennestone Hospital and Daniel Thomas Wu of Emory University School of Medicine, sought to determine how subcultures influence compliance, specifically within healthcare organizations.
鈥淓very organization has a culture that is typically set by top management. But within that, you have subcultures among different professional groups in the organization,鈥 said Sarkar. 鈥淓ach of these groups are trained in a different way and are responsible for different tasks.鈥
Sarkar and his fellow researchers focused on ISP compliance within three subcultures found in a hospital setting 鈥 physicians, nurses and support staff.
The expansive study took years to complete, with one researcher embedding in a hospital for over two years to observe and analyze activities, as well as to conduct interviews and surveys with multiple employees.
Because patient data in a hospital is highly confidential, one area researchers focused on was the requirement for hospital employees to lock their electronic health record (EHR) workstation when not present.
鈥淧hysicians, who are dealing with emergency situations constantly were more likely to leave a workstation unlocked. They were more worried about the immediate care of a patient than the possible risk of a data breach,鈥 said Sarkar. 鈥淥n the opposite end, support staff rarely kept workstations unlocked when they were away, as they felt they were more likely to be punished or fired should a data breach occur.鈥
Researchers concluded that each subculture within an organization will respond differently to the organization-wide ISP, leaving organizations open to a higher possibility of data breaches.
Their recommendation 鈥 consult with each subculture while developing ISP.
鈥淚nformation security professionals should have a better understanding of the day-to-day tasks of each professional group, and then find ways to seamlessly integrate ISP compliance within those job tasks,鈥 said Sarkar. 鈥淚t is critical that we find ways to redesign ISP systems and processes in order to create less friction.鈥
In the context of a hospital setting, Sarkar recommends touchless, proximity-based authentication mechanisms that could lock or unlock workstations when an employee approaches or leaves a workstation.
Researchers also found that most employees understand the value of ISP compliance, and realize the potential cost of a data breach. However, Sarkar believes that outdated ISP compliance measures have the potential to put employees in a conflict of priorities.
鈥淭here shouldn鈥檛 be situations where physicians are putting the entire hospital at risk for a data breach because they are dealing with a patient who needs emergency care,鈥 he said. 鈥淲e need to find ways to accommodate the responsibilities of different employees within an organization.鈥
The study, 鈥,鈥 was published in Information Systems Research.