2008
DOI: 10.1080/19393550802492487
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Information Security Awareness: Research and Practice Gaps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
28
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(29 citation statements)
references
References 16 publications
1
28
0
Order By: Relevance
“…Aforementioned measures require customer's needs assessment to understand an organization's objectives and mission, as well as to measure the present ISA level of the employees (users). In this regard, several studies have addressed IS and ISA in business organizations [6,7,8]. At the same time understanding threats is crucial to design countermeasures to mitigate risks [9].…”
Section: Introductionmentioning
confidence: 99%
“…Aforementioned measures require customer's needs assessment to understand an organization's objectives and mission, as well as to measure the present ISA level of the employees (users). In this regard, several studies have addressed IS and ISA in business organizations [6,7,8]. At the same time understanding threats is crucial to design countermeasures to mitigate risks [9].…”
Section: Introductionmentioning
confidence: 99%
“…Most of the frameworks of IS awareness offer or implement some awareness approaches and methods, for example techniques for conveying security messages, computer games, artificial intelligence devices, etc., with no justification of their specific choices and also defining their theoretical foundations (Tsohou et al, 2008;Puhakainen, 2006). In addition, those research methods which are in nature theoretical and test the problems and challenges of security awareness, exclusively draw from behavioral and physical theories.…”
Section: Approaches To Is System Awarenessmentioning
confidence: 99%
“…Information security awareness of Internet users was analyzed in Tsohou et al (2008) as well as Talib et al (2010). While Tsohou et al (2008) provide an overview on information security awareness, the study of Talib et al (2010) is based on survey data containing 333 observations.…”
Section: Introductionmentioning
confidence: 99%
“…While Tsohou et al (2008) provide an overview on information security awareness, the study of Talib et al (2010) is based on survey data containing 333 observations. The authors argue that -compared to private use -at an individual's workplace clearer legislation and regulation about IT security exist.…”
Section: Introductionmentioning
confidence: 99%