2017
DOI: 10.1007/s11416-017-0305-7
|View full text |Cite
|
Sign up to set email alerts
|

A performance evaluation of information security training in public sector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 8 publications
0
4
0
1
Order By: Relevance
“…Hal ini disebabkan karena pada awal pengembangannya model ini digunakan untuk evaluasi pendidikan di sekolah. Meskipun begitu, model CIPP juga dapat digunakan untuk mengevaluasi bidang lain, di antaranya pelaporan keuangan (Herawati & Kusumawati, 2020)Research and Development Agency, Ministry of Education and Culture, using CIPP (Context, Input, Process, Product, efektivitas implementasi e-budgeting (Rahman et al, 2018)Input, Process, and Product, kinerja pelatihan (Park et al, 2012), dan membuat model inovasi teknologi (Stone & Lane, 2012) Pada bagian selanjutnya dari artikel ini secara ringkas menjabarkan metodologi yang digunakan dan penjelasan tentang model evaluasi CIPP, dan TPM. Pada bagian pembahasan akan disajikan hasil penelitian yang diperoleh melalui wawancara dan survei, yang kemudian dianalisis untuk menguraikan faktor pendukung dan penghambat program bantuan rumah ibadah.…”
Section: Pendahuluanunclassified
“…Hal ini disebabkan karena pada awal pengembangannya model ini digunakan untuk evaluasi pendidikan di sekolah. Meskipun begitu, model CIPP juga dapat digunakan untuk mengevaluasi bidang lain, di antaranya pelaporan keuangan (Herawati & Kusumawati, 2020)Research and Development Agency, Ministry of Education and Culture, using CIPP (Context, Input, Process, Product, efektivitas implementasi e-budgeting (Rahman et al, 2018)Input, Process, and Product, kinerja pelatihan (Park et al, 2012), dan membuat model inovasi teknologi (Stone & Lane, 2012) Pada bagian selanjutnya dari artikel ini secara ringkas menjabarkan metodologi yang digunakan dan penjelasan tentang model evaluasi CIPP, dan TPM. Pada bagian pembahasan akan disajikan hasil penelitian yang diperoleh melalui wawancara dan survei, yang kemudian dianalisis untuk menguraikan faktor pendukung dan penghambat program bantuan rumah ibadah.…”
Section: Pendahuluanunclassified
“…[26] Development an establishment of ISMS [27] Awareness measures [28], [29], [30], [31], [32], [33] Lack of skilled workers in public sector and effects [34], [35] Physical Security and Security Assessment [36], [37], [38], [39], [40] Legal framework parameters in cybersecurity domain [41], [42] Maturity models [43], [44] Most papers deal with the safeguarding of the technical components or tackle the analysis of cyber-attacks and pos-sible preventive measures. It is striking that a large number of papers put the staff in the focus and examine how their awareness for cybersecurity can be increased.…”
Section: Thematic Areamentioning
confidence: 99%
“…Role of knowledge sharing among employees is paramount for business success. Knowledge sharing in relation to information security is often achieved through training and through provision of security policy procedures (Park 2017;Puhakainen and Siponen 2010). Encouraging knowledge sharing among employees can enhance their understanding of organizational issues and promote their commitment (Park 2017).…”
Section: Introductionmentioning
confidence: 99%
“…Knowledge sharing in relation to information security is often achieved through training and through provision of security policy procedures (Park 2017;Puhakainen and Siponen 2010). Encouraging knowledge sharing among employees can enhance their understanding of organizational issues and promote their commitment (Park 2017). However, few studies have examined how employees practice knowledge sharing in the context of cyber security (Rocha et al 2014), and whether to use knowledge acquisition and sharing at work as the potential channels to improve the cyber security system internally.…”
Section: Introductionmentioning
confidence: 99%