2016
DOI: 10.1007/978-3-319-31510-2_29
|View full text |Cite
|
Sign up to set email alerts
|

Persuasive Information Security: Techniques to Help Employees Protect Organizational Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 13 publications
0
14
0
Order By: Relevance
“…The Information Security Policy details the guidelines that are required to be followed by the employees of the organization while using the information assets. The policy can be enforced using technology also [14]. Technology which uses persuasive strategies has been utilized to enhance various of target behaviors in varied domains, for example , health, education, sustainability, etc [14].…”
Section: Creation Of Information Security Policymentioning
confidence: 99%
See 2 more Smart Citations
“…The Information Security Policy details the guidelines that are required to be followed by the employees of the organization while using the information assets. The policy can be enforced using technology also [14]. Technology which uses persuasive strategies has been utilized to enhance various of target behaviors in varied domains, for example , health, education, sustainability, etc [14].…”
Section: Creation Of Information Security Policymentioning
confidence: 99%
“…The policy can be enforced using technology also [14]. Technology which uses persuasive strategies has been utilized to enhance various of target behaviors in varied domains, for example , health, education, sustainability, etc [14]. Therefore, it is often advised to use technology to implement the Information Security Policy in the organization.…”
Section: Creation Of Information Security Policymentioning
confidence: 99%
See 1 more Smart Citation
“…Busch and Patil used personalized content generated through surveys and gamification to train people to follow cyber-security best practices [36]. Gamification uses game concepts and mechanisms, such as competition and leader boards, in nonentertainment applications [37][38].…”
Section: Persuasive Technologiesmentioning
confidence: 99%
“…To encourage individuals to compete, the system posted scores on a board. While gamification can be used to increase engagement and potentially persuasion, the personalization in existing work is primarily in the form of categorization of users based on age, gender, or personality/gamer type rather than unique individual features [39][40] [36].…”
Section: Persuasive Technologiesmentioning
confidence: 99%