2016
DOI: 10.1109/mitp.2016.84
|View full text |Cite
|
Sign up to set email alerts
|

Security Fatigue

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

3
43
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 79 publications
(59 citation statements)
references
References 11 publications
3
43
0
Order By: Relevance
“…Lack of planning only increases as these symptoms of security fatigue increases. Lack of planning, as we have noted, leads to more reactive decisions, leading to more security fatigue and so on [34].…”
Section: Discussionmentioning
confidence: 89%
See 2 more Smart Citations
“…Lack of planning only increases as these symptoms of security fatigue increases. Lack of planning, as we have noted, leads to more reactive decisions, leading to more security fatigue and so on [34].…”
Section: Discussionmentioning
confidence: 89%
“…Analysis of the relationship amongst these codes shows the ways in which they work together to either provide protection while online or not. Perhaps most important is the way in which the beliefs (Trust Too Much) and behaviors (No Plans) of non-experts result in the need for reaction which contributes to security fatigue [34]. The relationships amongst these codes are depicted by the behavioral model in Figure 1.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…From a cybersecurity chain perspective, the real problems are: (i) insecure use, which leads to many security updates, and (ii) intentional misuse, which leads to continuous security patches. Both problems are user-centered; the insecure use results from security fatigue and user ignorance of security best practice, while the intentional misuse results from security-deficient systems and human desire to violate software or hardware under their control [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…One set of studies that can predict how ZTA affects end user experience is the work done on the use of MFA in enterprises and security fatigue. Security fatigue [3] is the phenomenon wherein end users are confronted with so many security policies and challenges that it begins to impact their productivity in a negative way. Other studies show that MFA may alter user behavior, but the overall change is mixed [4] [5].…”
mentioning
confidence: 99%