2015
DOI: 10.1016/j.cose.2015.04.006
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
69
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 112 publications
(69 citation statements)
references
References 42 publications
0
69
0
Order By: Relevance
“…Moreover, some people may in fact doubt their self-efficacy in that they are unequipped to handle security related issues. Tsohou et al (2015) claim that these factors come as a result of "cognitive and cultural biases" that people may have, based on their personal beliefs and experiences.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, some people may in fact doubt their self-efficacy in that they are unequipped to handle security related issues. Tsohou et al (2015) claim that these factors come as a result of "cognitive and cultural biases" that people may have, based on their personal beliefs and experiences.…”
Section: Introductionmentioning
confidence: 99%
“…This affects both how people regard security in general, as well as how they will respond to security training (Beris et al, 2015). Tsohou et al (2015) provide an aggregated list of factors that have been mentioned in extant literature to affect security policy compliance. Seemingly, there are several factors to consider other than just awareness.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Alternatively, organizations can implement role-based access control policies that describe viable user accounts in terms of interdependences and relationships with other data sources [13]. However, some research results show that security policy that is based on monitoring alone is far from ideal in fostering users to comply with security procedures [6].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the lower-levels employees should be involved in the formulation of the information security policies as stakeholders in this process [5]. HR and IT must collaborate on the internal policy guidelines that define authorization and responsibility issues [13]. Information security knowledge sharing, positive collaboration and adoption of training methods within the organization are pivotal to the success of the process and strongly affect the attitudes and awareness of employees towards organizational security policies and procedures.…”
Section: Introductionmentioning
confidence: 99%