1. »
  2. Human-Centred Security
  3. »
  4. Lehre
  5. »
  6. Abschlussarbeiten
  7. »
  8. BA­CHE­LOR OR MAS­TER THE­SIS: IT SE­CU­RI­TY AND PRO­DUC­TIVI­TY IN OR­GA­NIZA­T­I­ONS: ME­A­SU­RING THE IM­PACT OF IT SE­CU­RI­TY ON THE EVERY DAY LIFE OF EM­PLOYEES

BA­CHE­LOR OR MAS­TER THE­SIS: IT SE­CU­RI­TY AND PRO­DUC­TIVI­TY IN OR­GA­NIZA­T­I­ONS: ME­A­SU­RING THE IM­PACT OF IT SE­CU­RI­TY ON THE EVERY DAY LIFE OF EM­PLOYEES

ALL­GE­MEIN

Be­treu­er: Jonas Hiel­scher, Mar­ti­na An­ge­la Sasse
Be­ginn: at any time
Wei­te­re De­tails: [Call for The­sis]

 
BE­SCHREI­BUNG

Mul­ti­ple Ba­che­lor and Mas­ter The­sis around the topic IT Se­cu­ri­ty and Pro­duc­tivi­ty in Or­ga­niza­t­i­ons: Me­a­su­ring the im­pact of IT Se­cu­ri­ty on the Every Day Life of Em­ployees are ad­ver­ti­sed at the Chair for Hu­man-Cent­red Se­cu­ri­ty (HCS)

IT se­cu­ri­ty me­a­su­res and rules in or­ga­niza­t­i­ons are often in con­flict with the pri­ma­ry tasks of em­ployees and hence can have a ne­ga­ti­ve im­pact on the em­ployees wor­king pro­duc­tivi­ty. A ty­pi­cal ex­amp­le would be that one needs to enter a pass­word to de­crypt the com­pu­ters disk fol­lo­wed by ano­ther pass­word to login, than a third pass­word to con­nect to the VPN and fi­nal­ly a pass­word for the ne­cessa­ry ap­p­li­ca­ti­on. In that case mi­nu­tes are was­ted with an au­then­ti­ca­ti­on pro­ce­du­re be­fo­re the pro­duc­tive task (the work with the ap­p­li­ca­ti­on) starts.

For stu­dents al­re­a­dy wor­king in an or­ga­niza­t­i­on or with the will to find a par­ti­ci­pa­ting or­ga­niza­t­i­on, we offer the op­por­tu­ni­ty to write ba­che­lor or mas­ter the­sis with an em­pi­ri­cal focus. The the­sis shall eva­lua­te and me­a­su­re the im­pact that se­cu­ri­ty me­a­su­res and rules have on em­ployees pro­duc­tivi­ty. Sur­veys, in­ter­view- or dia­ry-Stu­dies are at the heart of the the­sis. Such could for ex­amp­le be per­for­med with se­cu­ri­ty pro­fes­sio­nals, ma­nage­ment, or em­ployees wi­t­hin one or mul­ti­ple or­ga­niza­t­i­ons. The ac­tu­al de­sign of the study will be de­ve­lo­ped under close su­per­vi­si­on of the HCS team. The stu­dents need to have a solid un­der­stan­ding of human fac­tors in IT se­cu­ri­ty as well as in qua­li­ta­ti­ve and/or quan­ti­ta­ti­ve re­se­arch me­thods (de­sign of sur­veys/in­ter­views, tran­scrip­ti­on, co­ding, ve­ri­fi­ca­ti­on of re­sults, etc.). Hence, it is a huge ad­van­ta­ge that the stu­dents par­ti­ci­pa­ted in at least one lec­tu­re as well as the la­bo­ra­to­ry cour­se of the chair for Hu­man-Cent­red Se­cu­ri­ty.

The the­sis might be writ­ten in English or Ger­man.

You can ex­pect a close su­per­vi­si­on with mul­ti­ple feed­back cir­cles with the goal to fi­na­li­ze your the­sis with an out­stan­ding grade.

Plea­se send your ap­p­li­ca­ti­on to Jonas.​Hielscher[AT]ruhr-uni-bo­chum.​de In­clu­de a few sen­ten­ces about the or­ga­niza­t­i­on you want to co­ope­ra­te with for your the­sis, as well as a tran­script of re­cords.

We are look­ing for­ward!

Re­fe­ren­ces:

  • [1] Adam Beau­te­ment, M. An­ge­la Sasse, and Mike Won­ham. 2008. The com­pli­an­ce bud­get: ma­na­ging se­cu­ri­ty be­ha­viour in or­ga­ni­sa­ti­ons. In Pro­cee­dings of the 2008 New Se­cu­ri­ty Pa­ra­digms Work­shop (NSPW ’08). As­so­cia­ti­on for Com­pu­ting Ma­chine­ry, New York, NY, USA, 47–58. DOI: https://​doi.​org/​10.​1145/​1595676.​1595684
  • [2] Beau­te­ment, Adam & Be­cker, In­golf & Par­kin, Simon & Krol, Kat & Sasse, An­ge­la. (2016). Pro­duc­tive Se­cu­ri­ty: A scalable me­tho­do­lo­gy for ana­ly­sing em­ployee se­cu­ri­ty be­ha­viours.