2010 - Improving Information Security Awareness and Behaviour Through Dialogue, Participation and Collective Reflection. An Intervention Study
2010 - Improving Information Security Awareness and Behaviour Through Dialogue, Participation and Collective Reflection. An Intervention Study
available at www.sciencedirect.com
Article history: The paper discusses and evaluates the effects of an information security awareness pro-
Received 19 June 2009 gramme. The programme emphasised employee participation, dialogue and collective
Received in revised form reflection in groups. The intervention consisted of small-sized workshops aimed at
19 November 2009 improving information security awareness and behaviour. An experimental research
Accepted 10 December 2009 design consisting of one survey before and two after the intervention was used to evaluate
whether the intended changes occurred. Statistical analyses revealed that the intervention
Keywords: was powerful enough to significantly change a broad range of awareness and behaviour
Information security indicators among the intervention participants. In the control group, awareness and
Awareness behaviour remained by and large unchanged during the period of the study. Unlike the
Behaviour approach taken by the intervention studied in this paper, mainstream information security
Participation awareness measures are typically top-down, and seek to bring about changes at the
Intervention study individual level by means of an expert-based approach directed at a large population, e.g.
Training through formal presentations, e-mail messages, leaflets and posters. This study demon-
strates that local employee participation, collective reflection and group processes produce
changes in short-term information security awareness and behaviour.
ª 2009 Elsevier Ltd. All rights reserved.
* Corresponding author. Department of Industrial Economics and Technology Management, Norwegian University of Science and
Technology, N-7491 Trondheim, Norway.
E-mail address: [email protected] (E. Albrechtsen).
0167-4048/$ – see front matter ª 2009 Elsevier Ltd. All rights reserved.
doi:10.1016/j.cose.2009.12.005
computers & security 29 (2010) 432–445 433
knowledge through processes that involve employees is both its effects in valid ways, thus answering the research ques-
necessary and efficient in order to attain all kinds of organ- tions formulated in the above. Two approaches were utilized
isational change (Ehn, 1992; Greenberg, 1975; Greenwood and for this purpose: statistical analysis three surveys – one before
Levin, 1998; Levin and Klev, 2002). This argument is also the and two after the intervention; and qualitative analysis of the
theoretical foundation for the intervention study presented in data from the intervention processes.
this paper, which emphasises the importance of employee
participation, plenary reflections and group for improving
employees’ information security awareness and behaviour. 2. The intervention project: information
Fig. 1 shows a simple conceptual model of the intervention security workshops
study, adapted from Kristensen (2005) and adjusted for the
current study. To the left is the theoretical model of the The intervention programme took place at a Norwegian public
intervention, which shows that the intervention is expected to administration agency, the Brønnøysund Register Centre. The
improve information security awareness and behaviour Brønnøysund Register Centre is responsible for several
among the intervention participants (indicated by the vertical different national computerised registers providing support
arrow). The main part of the intended intervention was and services for businesses and public administrations. It is
a small-sized 2-h workshop. The workshop participants con- thus vital that stored information is easily available and
ducted most of the discussions among themselves, which correct when needed, and presented in proper form. Conse-
created the possibility for each participant to reflect over their quently, information security is essential to the core opera-
working situation and information security on their own tions of the register centre.
terms. Inviting employees to actively share their experiences For the Brønnøysund Register Centre the objective of the
and thoughts on information security as well as listen to intervention was to improve information security attitudes
colleagues’ and security officers’ knowledge in plenary among the employees, and change work behaviour relevant to
reflections and in small groups was expected to result in information security for the better. Workshops with some 15
changes of both awareness and behaviour. participants each constituted the main part of the interven-
The two boxes to the right represent the actual course of tion. In addition, certain measures directed at all the members
events, which should hypothetically reflect the theoretical of the organisation were also implemented. A news message
model. The vertical and horizontal relationships in the model regarding the planned information security workshops was
indicate two research questions: published on the company’s intranet, together with a message
emphasising that everyone must keep their ID-card visible.
- Was the intervention carried out as intended? Additionally, an information security handbook was pub-
- Did the intervention lead to the intended changes in infor- lished on the intranet.
mation security awareness and behaviour?
2.1. Theoretical framework
These research questions are followed by a question
addressing the causes of the modifications – or lack of such – Two fixed frames were established for the workshops in the
of information security abilities: development of the intervention: a set of information security
subjects to be covered, and a theoretical framework regarding
- Why did the intervention lead to changes – or lack of such – the processes in the meetings. Through worker participation,
of awareness and behaviour? collective reflections, group-work, and experience transfer at
an organisational level the intervention project aimed at
The two boxes in the middle of the model represent the changing individual security performance. Individual change
empirical research aimed at measuring the intervention and is important since it is individuals who perform organisational
activities. However, an organisation is a collective institution
of interaction and coordination (Weick, 1996). Consequently,
common insight into information security structures and
procedures is fundamentally important for coordinated
information security interaction in an organisation. Group-
based sharing of experiences and knowledge between
employees and information security professionals is impor-
tant for the information security work, since it is likely to
created common insight among employees. For this inter-
vention project, sharing experiences and knowledge between
members of the organisation is facilitated by participation,
collective dialogues and considerations, and group-work
processes.
The effects of employee participation on organisational
development and change are known within several research
traditions, but this knowledge is not reflected in mainstream
standards and guidelines for information security (Albrecht-
Fig. 1 – Conceptual model of the intervention study. sen and Hovden, 2007). Participation is likely to create
434 computers & security 29 (2010) 432–445
advantageous information security conditions, such as most of the talking. The participants were encouraged to
improved ownership and motivation among workers (Green- contribute with their thoughts about information security and
berg, 1975); improved quality of technological solutions (Adler to talk among each other in order to create reflection. After the
and Winograd, 1992; Ehn, 1992); and reduced levels of risk brief introduction, a short animated cartoon was shown,
(Elden, 1983; Shrader-Frechette, 1991). Moreover, it will satisfy functioning as a simple introduction to the field of informa-
the democratic rights of workers to influence their own tion security and the role of individuals in security work.
working conditions (Elden, 1983; Greenberg, 1975). Worker Next, the first plenary discussion was launched. The
participation and collective reflection are claimed to be the security officers presented a simple question: ‘Why do we
two foundation pillars for the success of all kinds of organ- need information security? The discussions related to this
isational learning, change and development (Levin and Klev, question led to the statement that information security is
2002). Collective reflection can be made possible for example important for the Brønnøysund Register Centre as it is
by having plenary discussions and avoiding one-way supposed to supply information to the public in a stable
communication and lecturing during training sessions, thus manner 24 h a day, 7 days a week. Additionally, the discus-
aiming at dialogue rather than instructions. The collective sions emphasised that each user has an important role to play
reflections produce a mutual understanding of routines in in the information security work.
organisational work, which is fundamentally important for After this, the group-work was introduced. The partici-
the interaction in an organisation. Interaction in groups pants were divided into seven groups or pairs of 2–3 persons
facilitates participation and collective thinking. Furthermore, sitting next to each other. Seven different scenarios were used
groups represent a good tool for experience and knowledge for igniting discussions, i.e. one scenario per group. The
transferral among both employees and managers (Levin and scenarios were as follows:
Rolfsen, 2004).
- You’ve been out for lunch. A stranger says he has forgotten
2.2. The contents and processes of a workshop his entrance card, and asks you to let him in. What do you
do?
The intervention study includes six workshops, involving - You work in a landscaped office and must leave your desk
a total of some 100 employees (15–20 participants per work- for a short while. What do you do?
shop). These workshops took place in April 2006. Later, the - You’re having a day off. Someone at work phones you and
rest of the organisation participated in 33 additional work- asks for your password in order to access an important
shops, but these are not included in the current evaluation. e-mail you have received. What do you do?
Fig. 2 illustrates the contents and processes of a single - You’re about to log on to a computer when you observe that
workshop. someone else is already logged on to that computer. What
The session started with a clear statement that there do you do?
would be no one-way communication from the security offi- - On the company’s public file folder, you get access to
cers. Rather, it was emphasised that the meeting was a forum a document containing sensitive personal information
for discussion, and that the participants were supposed to do about colleagues. What do you do?
- You’re checking your private hotmail and find that you have the intervention. The quantitative approach uncovers
received an e-mail from an unknown sender. What do you whether the intervention had any effect on awareness and
do? behaviour, whereas the qualitative approach provides us with
- There is a fire outside your office. What do you do? an understanding of how that effect was brought about by the
intervention. The design and analysis of the current inter-
After the group discussions were finished, each scenario vention study draws on methodological experiences from
was discussed in plenary. Each scenario was discussed occupational health and safety intervention studies [e.g.
following the same interwoven steps. The discussion started (Goldenhar and Schulte, 1994; Kristensen, 2005; Robson et al.,
by a group presenting their response to the scenario they had 2001)], i.e. ‘‘studies in which the effects of planned activities at
worked with. Then the rest of the participants were invited to the worksites with the aim of improving the working condi-
comment on the group’s answer. The security officers did not tions and/or the health of the workers are being evaluated
get involved in the ensuing plenary discussion unless neces- with research methods’’ (Kristensen, 2005:205). Occupational
sary, i.e. unless questions were addressed to the officers; the health and safety intervention can in a broad sense be
focus had strayed too far from the defined topic; or the considered as prevention-oriented interventions (Goldenhar
discussion was about to end. As the discussion seemed to be and Schulte, 1994); consequently, evaluation strategies
coming to a close, the security officers briefly presented their utilized in these intervention studies are useful for designing
view on the scenario. This presentation was often followed up and performing the evaluation of the effects of the current
by questions or comments from the participants. information security study as well.
This approach ensured that individual experiences were
shared among the participants. For example, one participant
3.1. Quantitative evaluation
would say: ‘‘I would never lock my computer when leaving my
desk. I can’t see any reason for doing that’’. This statement
3.1.1. Design and data collection procedure
was then followed up by a colleague agreeing. Then a third
An experimental design was used for measuring individual
colleague would question this, wondering why they do not
awareness and behaviour before and after the intervention.
lock their computers given that they have lots of sensitive
Fig. 3 shows the design of the study. The study population of
information stored in their systems. In this way individual
197 employees was randomized into an intervention group
tacit knowledge was shared among a group of employees.
participating in the workshops, and a control group not
As the penultimate point on the agenda, the security offi-
participating in the workshops.
cers summarized the workshop by presenting a set of 10
An initial survey (t1) was performed 1 month before the
information security rules. The participants were given
intervention took place. An invitation to fill in a web-based
a laminated, pocket-format leaflet containing these rules,
questionnaire containing questions on information security
along with the suggestion that they put this up beside their
awareness and behaviour was sent by e-mail to the study
computer screen. Finally, the last 5 min were used for evalu-
population. The questionnaire consisted of different state-
ation of the workshop.
ments on information security topics, which the respondent
had to agree or disagree on based on a 5-point Likert scale.
Regarding behaviour, there were questions on how often the
3. Method respondents performed different information security
actions, e.g. ‘how often do you lock your computer when
In our own evaluation, we used two main approaches: absent from it’. The participants responded to the behaviour
a quantitative survey; and a qualitative approach which questions on a 5-point Likert scale ranging from never to
combined interviews, group conversations and observation of always.
Fig. 3 – Model of multiple time-series research design with an intervention group and a control group.
436 computers & security 29 (2010) 432–445
The second survey (t2) took place one month after the information security is bothersome for my working situa-
workshops were arranged. In order to evaluate the stability of tion; A lot of information security requirements cannot be
the awareness and behaviour produced by the intervention, met if I’m going to work efficient; Managing information
a third survey (t3) was performed half a year after the inter- security is first and foremost a technical challenge).
vention. For each survey, both groups received the same Cronbach’s a ¼ .708.
questionnaires. The questions used in the first survey were 4. Importance of specific information security measures. Consists
also used in the second and third surveys. In addition, the of six items (Safe use of e-mail is important; Keeping
second and third surveys included questions about changes in passwords secret is important; Anti-virus tools are
behaviour and attitudes during the last months. In the second important; Locking the computer when absent from it is
survey, the members of the intervention group were asked to important; Cautious use of the internet is important;
assess the intervention and the impact of the intervention on Non-disclosure agreement is important). Cronbach’s
their attitudes and behaviour. For these additional questions, a ¼ .770.
closed questions was used, plus some open-ended questions 5. Importance of generic security and safety measures. Consists of
regarding how participants had experienced the workshops five items (Reporting incidents is important; Keeping ID-
and how the workshops could improve. cards visible is important; Following ethical guidelines is
The third survey was also sent out to the control group. important; Occupational accident prevention is important;
However, during the months which had passed since the Fire protection is important). Cronbach’s a ¼ .749.
second survey, an unknown number of the members of the
control group had participated in workshops. Hence, some of Due to poor correlation with other items, the following
the members of the control group were influenced by the single items are also used as indexes, as they are interesting
intervention at t3. Since it was not possible to divide the subjects with regard to the objective of the intervention.
control group between those who had participated in work-
shops and those who had not participated, the data for the 6. Reporting: Willingness to report observed or suspected
control group at t3 had to be discarded. information security incidents (If I observe or suspect an
information security incident, I will report this to the
3.1.2. Indexes management)
Based on factor analyses and on theoretical comprehension of 7. Perceived skills and knowledge: Perceived information secu-
which variables belong together, the following indexes were rity skills and knowledge with regard to the individual
constructed for the analysis of the intervention outcomes. The working situation. (I have the necessary information skills
indexes cover a broad range of aspects of information security and knowledge to handle information security in my
awareness and behaviour. working situation)
The variables/items included in the awareness indexes
were statements in the questionnaire, which the respondents The questionnaire included eight questions about the
had to agree or disagree on based on a 5-point Likert scale, frequency with which the respondent performed different
ranging from ‘strongly disagree’ to ‘strongly agree’. Each item information security tasks, such as keeping her password
used in the indexes is thus a statement. The following indexes secret. The items invited responses on a 5-point scale (from
on attitudes towards different information security topics always to seldom). Some of the items had a skewed distribu-
were constructed for the study: tion. Since it would be difficult to get significant changes for
these items, they were left out of the analysis. It was only
1. Responsibility: Perceived responsibility for information possible to perform useful pre-post analysis of four of the
security compared with other work responsibilities. behaviour items. These four items produced poor reliability in
Consists of five items (I have a responsibility to create and all possible combinations of four, three and two. Conse-
maintain a satisfactory level of information security at the quently, the analysis of behaviour items consists of four single
company; I have a personal responsibility to prevent that items:
my use of IT-systems create virus infections; I believe that
user friendly systems are more important than secure 8. Locking the computer
systems; Maintaining information security is equally 9. Carrying ID-cards
important to efficient work; One must always comply with 10. Checking unfamiliar persons without ID-cards
information security requirements irrespective of the 11. Manual virus-check
working situation). Cronbach’s a ¼ .760 (Cronbach’s a for
the intervention group, data from all three surveys) All indexes for the intervention group were satisfactory, i.e.
2. Motivation: Willingness to contribute to the information Cronbach’s a > .70. For the control group, the reliability was less
security work. Consists of three items (Writing passwords stable, as the indexes ‘Responsibility’, ‘Importance of generic
down on a note is OK; There is no need to lock my security and safety means’, and ‘Information security as tech-
computer when I leave it for a short period of time; It is no nological annoyance for work functionality’ gave 0.60 < a < .70.
wonder that people write down their passwords since they
are difficult to remember). Cronbach’s a ¼ .703. 3.1.3. Statistical analysis
3. Information security vs functionality: Information security Fig. 3 indicates the following null hypotheses that are to be
perceived as not being an obstacle and not only being statically tested in order to assess whether a change of
a technological challenge. Consists of three items (I think awareness and behaviour has occurred or not:
computers & security 29 (2010) 432–445 437
- H01: There is no improvement of awareness and behaviour mapping their impressions of the workshop and why it
at t2 compared to t1 among members of the intervention functioned as it did.
group - Free-text data from the second questionnaire regarding the
- H02: There is no change in awareness and behaviour at t3 structure and function of the workshop.
compared to t2 among members of the intervention group
- H03: There is no change in awareness and behaviour at t2 The qualitative data collected by the methods listed above
compared to t1 among members of the control group was analyzed by looking for patterns in the data (Leiulfrud and
Hvinden, 1996) that described how the intervention was
The first hypothesis is directional, so the test of signifi- interpreted and why the intervention modified or failed to
cance is one-tailed. For the other two hypotheses the test of modify awareness and skills. Furthermore, the data was also
significance is two-tailed. Testing of these hypotheses searched for reasons for these patterns.
answers the research question of whether the intended
changes have occurred in the awareness and behaviour of the
test subjects. 4. Results
All respondents were given an anonymous respondent
number, which was automatically generated by the web- This section presents the results of the quantitative and
based questionnaire software, and used in each of the three qualitative evaluation of the intervention study. First, quan-
surveys. As a consequence, individual respondent data was titative results are presented, indicating whether the intended
matched for each survey. The experimental design of the modifications of behaviour and awareness occurred among
intervention study thus made it possible to test the hypothesis the intervention group and whether or not there were any
of no difference from one point in time to another by using changes within the control group. Second, qualitative results
paired-sample t-tests, which were performed in SPSS. of the intervention study are presented, providing a basis for
An experimental design strengthens the internal validity of interpreting what caused the quantitative results.
the study, i.e. whether it actually is the intervention that
modifies awareness and behaviour in the current study. 4.1. Quantitative evaluation
Randomization strengthens the experimental design, as one
can be more certain that differences between the intervention 4.1.1. Participants
group and the control group can be attributed to the effect of Table 1 shows the demographic characteristics of the partic-
participation in the intervention and not to group differences ipants of the study at t1. Chi-square tests show no significant
(Robson et al., 2001). The best way to ensure external validity differences between the two groups. Independent sample
for experimental designs is to randomize groups (Ringdal, t-tests for the awareness and behaviour indexes revealed that
2001). there were no significant differences between the interven-
tion and the control group at t1.
3.2. Qualitative evaluation 196 respondents of the total study population of 197 replied
to one or more of the surveys at a response rate of 92% for the
The quantitative analysis of an intervention should be sup- pre survey, 89% for the post survey and 84% for the post–post
ported by qualitative evaluation techniques (Kristensen, 2005;
Robson et al., 2001). This triangulating approach offers better
interpretation of the intervention and its effects, as qualitative
Table 1 – Comparison demographic characteristics of
methods provide a breadth and depth to the evaluation that participants in the intervention group and the control
cannot be achieved by using quantitative approaches only. group at t1.
The use of qualitative methods is important not least for Intervention Control
studying the dynamics of the intervention process itself, as group group
qualitative research provides understanding of social
Age (years)
processes (Strauss and Corbin, 1998; Thagaard, 2002).
18–29 8.0% 7.0%
The aim of the qualitative evaluation of the intervention is
30–39 36.5% 37.0%
thus to get indications of why the workshops functioned as 40–49 36.5% 32.5%
they did, and of how the workshops influenced awareness and 50–59 16.5% 16.5%
behaviour. Four qualitative research approaches were used to 60- 2.5% 7.0%
collect data: Education
High school 53.0% 46.5%
College/university <3 years 21.0% 21.0%
- Group-based discussions during the last part of each work-
College/university >3 years 16.5% 22.0%
shop. These gave input as to how the participants experi- Other 9.5% 10.5%
enced the workshop and its effect on their knowledge and Seniority (years)
skills. 0–1 1.0% 7.0%
- Observation study. The observation study aimed at mapping 1–5 22.5% 22.5%
how the workshop participants and the security officers 6–10 32.0% 24.0%
11–25 44.5% 46.5%
acted and reacted to different elements in the meeting.
Women (%) 69.5% 71.0%
- An in-depth interview with each of the two security officers
N at t1 85 96
was conducted about a month after the workshops,
438 computers & security 29 (2010) 432–445
survey. 143 employees responded to all three surveys. The above the median value of the ordinal scale. This suggests that
number of respondents used in the paired-sample t-tests was the awareness of the study population is fairly high. This
given by adding the respondents who replied to either the pre pattern is not reproduced for the behavioural indexes.
and post surveys or to the post and post–post surveys to the However, the purpose of this study is not to evaluate the
number of respondents who replied to all three surveys. For information security condition, but to identify whether
the pre-post test this gave N ¼ 79 respondents in the inter- modification of awareness and behaviour has occurred or not.
vention group and N ¼ 89 respondents in the control group. Generally speaking, the data shows that awareness and
N ¼ 71 of the members of the intervention group answered behaviour among members of the intervention group had
both the post and the post–post survey. improved a month after the workshop, while the control
group had mainly remained stable over the same period of
4.1.2. Pre-post test time. Awareness had improved more significantly than
Table 2 gives the results of the paired-sample t-test of the pre behaviour among the intervention group. In particular, this
and post surveys for both the control group and the inter- group shows significant improvement of their personal will-
vention group. All indexes range from 1 (poorest) to 5 (best), so ingness to contribute to the information security work
the awareness indexes are generally quite high for both the ( p < .001) and personal responsibility for information security
intervention group and the control group. At t2 most of the ( p < .001). It can thus be claimed that the personal involve-
indexes have a score around 4, but eve at t1 the indexes are ment and commitment to information security has improved
Table 2 – Results of paired-sample t-test of the pre and post survey for intervention and control group.
Index Pre Mean (SD) Post Mean (SD) t (df)
Awareness Responsibility
Intervention group 3.91 (0.45) 4.12 (0.52) 4.16 (75)****
Control group 4.05 (0.49) 4.06 (0.51) 0.31 (86)
Motivation
Intervention 3.54 (0.94) 3.89 (0.81) 4.80 (78)****
Control 3.56 (0.84) 3.75 (0.87) 2.60 (88)^
Info.sec vs functionality
Intervention 3.46 (0.64) 3.59 (0.62) 1.95 (78)*
Control 3.56 (0.62) 3.52 (0.58) 0.67 (85)
Reporting
Intervention 4.03 (0.73) 4.27 (0.80) 2.35 (78)*
Control 4.15 (0.89) 4.09 (0.92) 0.42 (88)
Perceived skills
and knowledge
Intervention 3.29 (0.75) 3.97 (0.66) 7.66 (78)****
Control 3.60 (0.77) 3.44 (0.75) 2.06 (88)^
Importance of specific
information security means
Intervention 3.89 (0.76) 4.13 (0.75) 3.32 (75)****
Control 4.10 (0.67) 4.02 (0.74) 1.34 (84)
Importance of generic
loss prevention means
Intervention 3.78 (0.84) 4.07 (0.80) 4.19 (75)****
Control 4.07 (0.72) 4.06 (0.73) 0.19 (87)
*One-tailed p < .05, **one-tailed p < .01, ***one-tailed p < .005, ****one-tailed p < .001.
^Two-tailed p < .05.
Indexes range from 1 (poorest) to 5 (best).
SD ¼ standard deviation, t ¼ t-value, df ¼ degrees of freedom.
computers & security 29 (2010) 432–445 439
among the intervention group members. The perceived after the workshops were arranged. The hypothesis of no
importance of loss prevention measures has improved difference of indexes between t2 and t3 was tested, and
significantly for this group. Although the main focus of the showed that there were no significant changes of awareness
workshops was on information security topics, the perceived among the intervention group. This implies that the
importance of generic loss prevention measures improved in improved awareness occurring one month after workshop
the same way as the specific information security measures. participation remains stable half a year after the workshops
There is a significant improvement for the single item of were arranged. Behavioural indexes have on the other hand
perceived personal knowledge and skills of information changed significantly in a positive direction at t3. This could
security among the intervention group ( p < .001). A two-tailed indicate that it takes more time to modify behaviour than
test of the same item shows that the control group has awareness. Three behaviour items have improved signifi-
a significant (two-tailed p < .05) decrease in perceived skills cantly from t2 to t3. All of these items had also improved
and knowledge. This negative change in the control group significantly from t1 to t2.
may indicate that non-participants in the workshop have
noticed the information security initiatives of the organisa- 4.1.3. Perceived change in awareness and behaviour
tion and feel that they, too, need more knowledge. The control Table 4 shows the distribution of answers to the question
group displays two significant changes in a positive direction: ‘have you changed your information security behaviour or
They show improved willingness to contribute to the infor- awareness during the last year?’ The paired-sample t-tests in
mation security work and have started locking the computer Tables 3 and 4 indicate that there are significant changes in
when away from it. Employees who have not yet participated the awareness and behaviour of the intervention group after
in the workshops have thus become more motivated for their participation in the intervention. These findings are
making individual contributions to information security, but validated by the participants’ perceived changes of awareness
simultaneously state that they feel an increased lack of and behaviour, which remained stable six months after the
knowledge and skills regarding information security. This workshops. Even some members of the control group feel that
should be an excellent point of departure for the planned their awareness and behaviour have changed one month after
security training of this group of employees. the intervention. Figs. 4 and 5 indicate which areas the
The post–post test (see Table 3) shows the result of the perceived changes have occurred in, and what the respon-
paired-sample t-test for the intervention group six months dents felt to be the causes for the changes.
Table 3 – Results of paired-sample t-test of the post and post–post survey for the intervention group.
Index Post mean (SD) Post–post Mean (SD) t (df)
Awareness Responsibility
Intervention 4.12 (0.53) 4.08 (0.51) 0.70 (69)
Motivation
Intervention 3.91 (0.81) 3.93 (0.79) 0.24 (70)
Info.sec vs functionality
Intervention 3.59 (0.67) 3.60 (0.69) 0.17 (70)
Reporting
Intervention 4.23 (0.87) 4.07 (0.93) 1.16 (70)
Perceived skills
and knowledge
Intervention 3.97 (0.70) 3.93 (0.68) 0.48 (70)
Importance of specific
information security means
Intervention 4.12 (0.77) 4.15 (0.77) 0.36 (69)
Importance of generic
loss prevention means
Intervention 4.10 (0.81) 4.15 (0.78) 0.81 (69)
80 %
60 %
Post Postpost
40 %
20 %
0%
ng
d
l
r
e
tt e
ai
y
ne
te
s
ar
ur
rit
nt
m
ti
pu
ue
-c
os
io
or
de
e-
te
m
ID
pr
iq
ep
In
cl
ci
of
co
et
is
ec
in
of
-d
se
d
g
.s
of
or
se
on
in
fo
e
ck
w
U
N
In
ar
ss
Lo
Aw
Pa
Fig. 4 – Areas in which members of the intervention group report changed awareness or behaviour for post and post–post
study (fixed alternatives, several answers possible pr respondent).
computers & security 29 (2010) 432–445 441
100 %
80 % Post Postpost
60 %
40 %
20 %
0%
g
e
s
ok
i re
op
op
eu
cl
er
na
sh
bo
rti
sh
th
as
-a
k
io
nd
o
k
l le
or
or
t
st
of
ne
ha
co
W
ue
tw
s
tra
ec
to
e
Q
ta
ng
In
.s
g
le
ha
in
fo
af
lk
In
C
le
Ta
ec
.s
fo
In
Fig. 5 – Causes of changed awareness and behaviour among members of the intervention group who have perceived
a change in behaviour or awareness (several answers possible pr respondent).
patterns which explain why the workshop was highly valued. The lively discussions and the active participation of the
Common for these patterns is that the actual processes taking employees are also explained by the atmosphere of the
place in the workshop are more important than the topics of workshop. The atmosphere was relaxed, pleasant and
discussion. informal. The tone was set by the humorous and engaging
The overall strategy behind the workshop was informed by way in which the workshop procedures and information
the theoretical framework presented earlier in the paper. This security issues were explained by the security officers. The
framework was materialized into action by aiming at involving entertaining approach taken by the security officers rubbed
employees in group conversations in order to make them reflect off on the participants. At the start of the meetings the
over information security and their own working situation. officers talked some nonsense with each other and the
There was no one-way communication from the officers to participants. This created roars of laughter, thus setting the
instruct the participants in terms of what they were supposed to scene for the described atmosphere. Although the meetings
think. Instead, the security officers functioned as facilitators for were funny, there was nonetheless a good balance between
the meetings. The expert knowledge of the information security jokes and seriousness. The relaxed and humorous atmo-
officers was only used as a tool to suggest alternative courses of sphere of the meetings was reflected in the role taken by
action for the participants if their thoughts were heading in the the security officers, who remained relaxed during the
wrong direction. The officers seldom interrupted discussions; session. They sat by the table, signalizing thus that they
rather, they let the participants do the talking. Many of the were not authoritarian chairmen. The two security officers
participants had expected one-way communication from the who facilitated the meeting were praised by the partici-
security officers in the meetings, and were thus pleasantly pants for their ability to make information security under-
surprised by the extensive use of plenary discussions and standable and humorous, both in the free text sections
involvement. One of the participants illustrated this neatly by included in the surveys and in the evaluation at the end of
stating: ‘‘I was alarmed by the thought of sitting here for 2 h each workshop.
being bombarded with information. I was thus very surprised by
the way the meeting was arranged. This is definitively the way to 4.2.1. More insight into the current state of information
inform employees’’, Participation in discussions was one of the security
main reasons that the participants experienced the workshops The quantitative analysis showed improved awareness and
as they did, as exemplified by the following quotation: ‘‘This behaviour among workshop participants. Another result of
approach is much better than just sitting there listening. It the workshop was that the information security officers
makes us think. My improved awareness will last longer after gained an understanding of how information security is
this kind of meeting’’. actually performed and interpreted in the organisation.
The discussions were lively during the 2 h, and almost all of Several inadequate security conditions were discovered
the participants contributed to the conversations. This is during the meetings. According to the security officers, these
partly explained by the size of the groups, which was suitable conditions would never have been recognized by other tools
for the learning strategy of involving workshop participants in and methods. Consequently, support for better decisions
an active way. In each workshop, the participants worked regarding information security was created. Also, the condi-
with similar issues, and they already knew each other well. tions for implementing information security measures are
Moreover, the company is located in a small town in northern probably improved as a result of the workshop intervention,
Norway, which implies that many of the participants knew of as the security officers have gained a better understanding of
each other from home and leisure activities. This created how information security work actually functions in the
confidence, and may have helped to ease the start of dialogues organisation. At the same time, the members of the organi-
as well as to maintain them during the workshop. sation have also become familiar with the information
442 computers & security 29 (2010) 432–445
security officers, which may make it easier for users to contact the organisation, and by the increased focus on information
these officers if other problems or questions should arise. security in all of its parts. For example, Fig. 5 shows that at t3,
about 20% say that talking to colleagues is one of the causes
for their changes of behaviour, whereas in contrast, about 10%
5. Discussion cited this as a reason at t2. The overview in Fig. 5 also shows
that administrative factors such as the information security
The conceptual model in Fig. 1 in the introductory part of this handbook, the intranet-article, and the leaflet influence
article raised some research questions regarding changes in behaviour and awareness.
awareness and behaviour, and causes for these possible
changes, and regarding whether the intervention was carried 5.2. Why did the workshops lead to intended changes?
out as intended. These questions are jointly discussed in the
following. The main part of the intervention was the workshop, although
it was combined with other measures. Among the set of
5.1. Intended changes in awareness and behaviour intervention measures used, participation in a workshop
proved to be by far the most powerful. Respondents who had
The pre-post test showed that the intervention was powerful not participated in workshops show very modest improve-
enough to significantly change awareness and behaviour ments of their information security abilities, whereas the
among the participants in the intervention group. The change improvements are very significant among the workshop
of awareness is here understood as improved attitudes and participants. This is verified by the perceived causes for
knowledge to information security after the intervention, changes cited among the intervention group; see Fig. 5. Over
while behavioural changes are related to perceived changes of 90% say that one of the causes for their changed information
behaviour among employees. The third survey half a year security features was participation in the workshops.
after the workshops showed that the awareness modifications A combination of several measures is often effective in loss
among the participants remained stable over time, and that prevention work (Lund and Aarø, 2004). Although they may
there was even a significant improvement for some behav- have less effect on awareness and behaviour changes than the
ioural attributes from the second to the third survey. The workshop, the other measures used in this intervention
control group mainly remained unchanged in the pre-post project should not be rejected. Not least, other measures play
test. an important role in the follow-up activities after the work-
Participation in the workshops is the only factor separating shop. In this particular study, the data from the control group
the intervention and control groups; it can thus be claimed shows that the intranet notice and filling out the question-
that the effect of the workshop has created the intended naire (Fig. 5) have caused a perceived change of awareness
improvements in awareness and behaviour. This is supported and behaviour. The pre-post paired-sample t-test (Table 2)
by the participants’ perceived causes for their changes; see indicates that members of the control group have improved
Fig. 5. At both t2 and t3, over 90% say that workshop partici- their attention to the field of information security, although
pation has caused changes in their awareness or behaviour. they have not improved their information security knowledge
The control group has a significant increase of their and skills. Hence, the measures other than the workshops
perceived lack of information security knowledge and skills used in the intervention have also been shown to have an
from t1 to t2. This indicates that the control group have been effect in terms of improved attention to information security.
affected in the sense that their attention to information However, since the most powerful intervention measure was
security has improved, but that they have not been influenced workshop participation, the following discussion of the cau-
in a way that makes them feel capable of safe and secure ses for the intervention’s intended changes concentrates on
performance in their jobs. This legitimizes the use of future the workshops.
workshops for the rest of the organisation. From a rationalistic point of view, users are supposed to act
The pre-post test showed smaller changes in information in compliance with rules and requirements for expected
security behaviour than in awareness for the intervention behaviour and technological inscriptions. On the other hand,
group. In contrast, the post–post test shows no changes in research indicates that users tend to have a different type of
awareness but significant improvements in behaviour at t3. rationality. Users trade off information security for other work
There are several possible explanations for this development. demands, they lack knowledge about information security
One interpretation is that the intervention participants know and associated risks, and they display poor information
how to behave and are capable of behaving that way at t2, security behaviour (Adams and Sasse, 1999; Albrechtsen, 2007;
whereas they only actually act this knowledge out at t3. Besnard and Arief, 2004; Post and Kagan, 2007; Stanton et al.,
Considering behaviour as a direct product of awareness, 2005). These research results indicate that there is a need to
one may argue that when awareness has matured for some improve users’ information security abilities. At the same
time, modified behaviour follows suit. On the other hand, time, these findings question users’ motivation for contrib-
Lund and Aarø (2004) show that the association between uting to the information security work of an organisation.
attitudes and behaviour is often weak. Not only attitudes, but Consequently, challenges emerge in terms of how to manage
several other factors also influence behaviour, e.g. social the human part of information security: How should infor-
norms, administrative frameworks, and technology. If we mation security management approach the users? The last
follow this line of thought, the delayed changes of behaviour part of the discussion looks into these challenges by elabo-
may be explained by changes occurring in the social norms of rating on why the workshop modified the awareness and
computers & security 29 (2010) 432–445 443
behaviour of its participants although research indicates that the use of local experience and knowledge of the workplace,
users’ information security performance cannot easily be the working conditions, the IT-systems and information
modified for the better. security. The plenary dialogues being based on the partici-
pants’ own terms ensured that the issues were recognisable
5.2.1. Participation and dialogue and accessible to all – an approach which created ownership
The theoretical basis for the intervention study emphasised and familiarity towards the subjects of discussion. Through
employee participation, collective reflection, group-work and the participants’ sharing of their experience and knowledge
knowledge sharing at an organisational level. The qualitative with each other, and the security officers’ expert contribu-
data material indicates that the intervention was carried out tions, organisational knowledge was according to Nonaka and
as intended regarding these preconditions. Takeuchi (1995) created and shared among organisational
Participation proved to be an effective way of influencing members (Nonaka and Takeuchi, 1995). This created
employees. The participants state that they had to actively a common interpretation of information security objectives,
involve themselves in discussions on information security, responsibilities and means. By sharing knowledge in an
and most of them report that they enjoyed this way of understandable way by listening or participating in collective
arranging information meetings. An important premise for reflections, individuals acquire knowledge themselves. This
involving the employees was that the security officers acquisition of knowledge creates improved information
stayed in the background. They were present, but not in security abilities among workshop participants. The informal
command, thus leaving the meeting open to the contribu- atmosphere, the limited role played by the security officers,
tions of the participants. When these were taken seriously and the mutual trust among the participants and the security
and their involvement was sought through the discussions, officers were all criteria which contributed to the successful
they proved to be interested in and motivated for informa- sharing of knowledge in the intervention described in our
tion security after all. Most of the participants expressed study.
opinions, made comments, voiced problems or asked Argyris and Schön (1996) argue that it is a change in the
questions. They thus engaged in an active relationship to theory-in-use rather than the espoused theory that creates
information security, which created improved motivation, organisational learning. The paired-sample t-tests indicate
understanding and ownership in relation to information changes in the theory-in-use, i.e. the behaviour, among indi-
security. The intention of the workshops was not to viduals who participated at the workshops. However, indi-
persuade users, but to convince them, by letting the vidual learning does not in itself create changes at an
participants reflect, on their own terms, on why information organisational level, because organisations are about people
security is important. The statistical analysis of the effects interacting. The most important difference between organ-
of the workshop indicates that this intention was fulfilled, isational and individual learning is that organisational
as there was significant improvement in the perceived learning means a change in common understanding, relations
importance of many aspects of information security among and interactions. We know from our study that individuals
the intervention group. have improved information security awareness and behav-
Through collective reflection and participation in groups, iour. However we do not know if changes in common under-
individuals get a possibility both to influence their own standings and interactions have happened, we can thus not
working conditions and to help shape the organisational conclude if organisational learning has occurred. To study if
community’s interpretations and insight into the organisation organisational learning occurred we need longitudinal
(Levin and Klev, 2002). This group-based reflection also research and a research design that studies relations and
ensures common insight into information security structures interactions in the organisation.
and procedures, which is fundamentally important for coor-
dinated interaction in an organisation (Weick, 1996). This logic 5.2.3. Interest and motivation
indicates that in addition to the changes taking place with Experiences from occupational safety intervention studies
respect to individual ideas and practices, collective thoughts reveal that if behavioural interventions are not interesting or
and routines also change (Levin and Klev, 2002). Groups are motivating (intensity), and/or the workers do not have enough
a connecting link between individuals and the different levels exposure to the interventions or enough vested in them
and layers in the organisation, and the use of groups makes it (frequency and duration), the intervention is unlikely to lead
possible to integrate individual considerations and initiatives to any changes in behaviour (Goldenhar and Schulte, 1994).
while at the same time dealing with the big picture (Levin and Regarding time spent on the intervention, it is interesting to
Rolfsen, 2004). Not least, groups are an excellent tool for note that although the duration of the intervention was rela-
transferring experience and knowledge among both tively short, the intervention had an effect. In a busy working
employees and managers. In this sense knowledge creation day, this is in particular of interest for information security
happened at an organisational level, as individuals interacted managers. The intervention was efficient both regarding
and shared their experiences and thoughts on information success (i.e. improved information security awareness and
security and the security experts added their expert knowl- behaviour) and regarding time spent. As discussed previously,
edge to the mixture. the most powerful factor in the intervention was the work-
shops. The workshop only lasted for 2 h, so the frequency and
5.2.2. Organisational knowledge creation duration of the intervention is low. The success of the inter-
Another important factor contributing to the modified vention must thus be explained by other factors than these
awareness and behaviour of the intervention participants was two factors.
444 computers & security 29 (2010) 432–445
Information security may in the first place seem boring to are grateful to the information security officers Olav Melteig
lay people, so the subject of the intervention may have looked and Marius Naaslund Gjerde, whose input made the inter-
uninteresting to the participants. Nevertheless, qualitative data vention study possible.
from the study reveals that employees’ motivation for and
interest in the intervention has actually been excellent, and
that this was one of the main reasons for the successful references
changes of awareness and behaviour. What made the work-
shop processes so interesting and motivating to the employees
was the dual factors of the relaxed and humorous atmosphere Adams A, Sasse MA. Users are not the enemy. Communications
of the ACM 1999;42(12):41–6.
and the active way in which the participants were involved. In
Adler PS, Winograd T. The usability challenge. In: Adler PS,
this sense, the process itself was more important for the Winograd T, editors. Usability – turning technologies into
modifications than the actual contents of the meetings. This tools. New York: Oxford University Press; 1992.
approach is a useful one, then, not least with respect to future Albrechtsen E, Hovden J. User participation in information
efforts to overcome the lack of motivation and knowledge of security. In: Aven T, Vinnem JE, editors. Risk, reliability and
information security among users described by several social safety: proceedings of the European safety and
reliability conference 2007 (Esrel 2007). London: Taylor &
academics (Adams and Sasse, 1999; Albrechtsen, 2007; Besnard
Francis; 2007. p. 2551–8.
and Arief, 2004; Post and Kagan, 2007; Stanton et al., 2005).
Albrechtsen E. A qualitative study of users’ view on information
security. Computers and Security 2007;26(4):276–89.
Argyris C, Schön D. Organizational learning II. New York: Addison
6. Conclusion Wesley; 1996.
Besnard D, Arief B. Computer security impaired by legitimate
users. Computers and Security 2004;23(3):253–64.
The approach of the intervention studied in this paper differs Ehn P. Scandinavian design: on participation and skill. In:
from mainstream information security awareness measures, Adler PS, Winograd T, editors. Usability – turning technologies
which typically aim at having an impact on the individual level into tools. New York: Oxford University Press; 1992.
through an expert-based approach directed at a large pop- Elden M. Democratisation and participative research in
ulation, e.g. in the shape of formal presentations, e-mails, developing local theory. Journal of Occupational Behaviour
1983;4(1):21–33.
leaflets and posters. This study demonstrates that locally based
Goldenhar LM, Schulte PA. Intervention research in occupational
employee participation, collective reflection, group processes,
health and safety. Journal of Occupational Medicine 1994;
and knowledge creation at an organisational level create 36(7).
changes in information security awareness and behaviour at Greenberg ES. The consequences of worker participation:
an individual level. By measuring employees’ attitudes and a clarification of the theoretical literature. Social Science
knowledge to information security in addition to perceived Quarterly 1975;56(2):191–209.
individual information security behaviour before and after the Greenwood DJ, Levin M. Introduction to action research.
Thousand Oaks, CA: SAGE Publications; 1998.
intervention, the study successfully shows that information
Hubbard W. Methods and techniques of implementing a security
security workshops of short duration and small size produce awareness program. SANS Institute; 2002. white paper.
powerful changes that remain stable for at least half a year. Kristensen TS. Intervention studies in occupational
Some principles applied in the intervention were particu- epidemiology. Occupational and Environmental Medicine
larly important for the successful improvement of awareness 2005;62(3):205–10.
and behaviour among the intervention participants. These are Leiulfrud H, Hvinden B. Analyse av kvalitative data: fikserbilde
eller puslespill? [Qualitative data analysis: puzzle picture or
employee participation, collective dialogue and reflections in
jigsaw puzzle?] (in Norwegian). In: Holter H, Kalleberg R,
a universally comprehensible language register based on the
editors. Kvalitative metoder i samfunnsvitenskapene. Oslo,
employees’ own terms, laid-back expert facilitators, mutual Norway: Universitetsforlaget; 1996.
trust in small-sized groups, and sharing of locally-based tacit Levin M, Klev R. Forandring som praksis. Læring og utvikling i
knowledge. These principles should be emphasised in organisasjoner [Change as practise. Learning and
participation-based approaches to information security development in organisations] (in Norwegian). Bergen,
management. Norway: Fagbokforlaget; 2002.
Levin M, Rolfsen M. Arbeid i team [Work in teams] (in Norwegian).
The approach used in this intervention is transferable to
Bergen, Norway: Fagbokforlaget; 2004.
other companies and sectors as well. The descriptions of the
Lund J, Aarø LA. Accident prevention. Presentation of a model
intervention are not normative; it is thus possible to adjust the placing emphasis on human, structural and cultural factors.
approach to other contexts, or even to other kinds of threats Safety Science 2004;42(4):271–324.
and hazards in risk management, as it was the processes Nonaka I, Takeuchi H. The knowledge-creating company. New
behind the workshop and not its contents and subject matter York: Oxford University Press; 1995.
that above all caused the intended modifications. Post GV, Kagan A. Evaluating information security tradeoffs:
restricting access can interfere with user tasks. Computers
and Security 2007;26(7):589–99.
Ringdal K. Enhet og mangfold, samfunnsvitenskaplig forskning
og kvantitativ metode [Unity and diversity, social research and
Acknowledgements quantitative methods] (in Norwegian). Bergen, Norway:
Fagbokforlaget; 2001.
The authors wish to thank the employees at the Brønnøysund Robson LS, Shannon HS, Goldenhar LM, Hale AR. Guide to
Register Centre who contributed to the study. In particular, we evaluating the effectiveness of strategies for preventing work
computers & security 29 (2010) 432–445 445
injuries: how to show whether a safety intervention really research interests include human and organisational aspects of
works. NIOSH Publication No. 2001-119. Cincinnati, OH: information security and strategies for safety and security
NIOSH; 2001. management. He is currently a senior research scientist at SINTEF
Shrader-Frechette KS. Risk and rationality. Oxford: University of Technology and Society and is also employed as an adjunct
California Press; 1991. assistant professor at the Department of Industrial Economics
Stanton JM, Stam KR, Mastrangelo P, Jolton J. Analysis of end user and Technology Management at the Norwegian University of
security behaviours. Computers and Security 2005;24(2):124–33. Science and Technology.
Strauss A, Corbin J. Basics of qualitative research. Thousand
Oaks, CA: SAGE Publications; 1998. Jan Hovden is a professor in safety management at the Depart-
Thagaard T. Systematikk og innlevelse. En innføring i kvalitativ ment of Industrial Economics and Technology Management at the
metode [Introduction to qualitative methods] (in Norwegian). Norwegian University of Science and Technology. His fields of
Bergen, Norway: Fagbokforlaget; 2002. interest are: safety and security management in industrial orga-
Voss BD. The ultimate defense of depth: security awareness in nisations; vulnerabilities of infrastructures and dynamic complex
your company. SANS Institute; 2001. white paper. socio-technical systems; and social safety. He has produced
Weick KE. Sensemaking in organizations. Thousand Oaks, CA: several publications within different types of loss prevention
SAGE Publications; 1996. disciplines and sectors. He has been a member of editorial boards
of international journals and a great number of scientific
Eirik Albrechtsen obtained his PhD at the Department of Indus- committees. He also was a member of the Norwegian Gov-
trial Economics and Technology Management at the Norwegian ernment’s commission on the vulnerability and emergency
University of Science and Technology in 2008. His current preparedness of the Norwegian society.