Cognitive Load, IS use and Cyberscurity behavior

Start Date

23-10-2020 1:30 PM

End Date

23-10-2020 2:00 PM

Location

Zoom Session 2 (SunTrust Track)

Abstract

A key organizational mechanism used to manage IT security relates to security policies and procedures. Such procedures tend to be prescriptive and assume all individual use of technology to be rational and similar. However, recent research in information use identifies three clear and distinct types of IT use that depends on technology familiarity and task at hand. The three types of uses (initial, continued and novel use) draw on different types of cognitive load. This research draws on the theory of cognitive load from psychology to understand the impact on behavior and performance of actions Our primarily focus is on post- adoptive (continued and novel use) behavior, since that is what most users tend to do, since that is where much of the organizational security instructions happen. We propose using NeuroIS methods to evaluate and test each of the components of the theory.

This document is currently not available here.

Share

COinS
 
Oct 23rd, 1:30 PM Oct 23rd, 2:00 PM

Cognitive Load, IS use and Cyberscurity behavior

Zoom Session 2 (SunTrust Track)

A key organizational mechanism used to manage IT security relates to security policies and procedures. Such procedures tend to be prescriptive and assume all individual use of technology to be rational and similar. However, recent research in information use identifies three clear and distinct types of IT use that depends on technology familiarity and task at hand. The three types of uses (initial, continued and novel use) draw on different types of cognitive load. This research draws on the theory of cognitive load from psychology to understand the impact on behavior and performance of actions Our primarily focus is on post- adoptive (continued and novel use) behavior, since that is what most users tend to do, since that is where much of the organizational security instructions happen. We propose using NeuroIS methods to evaluate and test each of the components of the theory.