2021
DOI: 10.1007/s00779-021-01549-w
|View full text |Cite
|
Sign up to set email alerts
|

A framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The study of Huang et al [43] indicated that people's adoption intention is improved by changing their perceived knowledge, awareness, and controllability; however, of these, changing the perceived controllability is the most effective. Govender et al [44] pointed out that incorporating IS into the culture of the IT staff members that support these technologies is a key function that must be considered in parallel to improved security technology.…”
Section: Is and Related Incidentsmentioning
confidence: 99%
“…The study of Huang et al [43] indicated that people's adoption intention is improved by changing their perceived knowledge, awareness, and controllability; however, of these, changing the perceived controllability is the most effective. Govender et al [44] pointed out that incorporating IS into the culture of the IT staff members that support these technologies is a key function that must be considered in parallel to improved security technology.…”
Section: Is and Related Incidentsmentioning
confidence: 99%
“…This phase involves a knowledge acquisition process by identifying objects, attributes, and values from a knowledge source. The primary knowledge developed in this study was constructed from KAMI's framework [26], where the secondary knowledge was obtained from related literature [1], [10], [13], [27], [28]. The latest version of KAMI (version 4.2) consists of seven parts, where the first part is used to decide the level or category of the electronic system used in the organization.…”
Section: Analysis and Extract The Core Knowledge Of Kamimentioning
confidence: 99%
“…However, the priority and importance of each factor vary significantly between organizations. These factors are generally affected by technological adoption (products and devices) and organizational context (risk, culture, and structure) [10]. Furthermore, the research in information security investment suggested two approaches to address this situation: implementing a decision-making strategy or using an economic model [3].…”
Section: Introductionmentioning
confidence: 99%
“…The conclusion is that those who are in charge of IS security management in organisations should target increasing employee's self-efficacy. [8]: a framework and tool for the assessment of information security risk, the reduction of information security cost and the sustainability of information security culture This study proposes a framework which addresses the issues pertaining to building a culture which demonstrates secure behaviour amongst staff members with minimal resources. Their focus was specifically on information technology (IT) staff members, as they argued that they play an integral part of supporting and sustaining the key technologies that are incorporated by an organisation.…”
Section: Study [6]: Understanding Users' Perceptions To Improve Fallback Authenticationmentioning
confidence: 99%