“…In terms of concerns of the information security in the literature, it is aimed to ensure that availability, confidentiality and integrity of information are not compromised (Güldüren & Keser, 2015;Kritzinger & Smith, 2008). Taking a closer look at these studies, according to research findings, it is stated that many threats and user error intended for different dimensions such as access and password security, social network security, threats and defense methods, software installation and updating, email security, internet and network security, social engineering (manipulations of the people through some tricks such as hiding or disguising real life identities, and awareness of users cause the information security gaps (Alhejaili, 2013;Arachchilage & Love, 2014;Berrier, 2007;Chen, 2014;Van Bruggen, 2014;Valcke et al, 2007).…”