2016 6th International Conference on Information and Communication Technology for the Muslim World (ICT4M) 2016
DOI: 10.1109/ict4m.2016.054
|View full text |Cite
|
Sign up to set email alerts
|

Persuasive Technology for Improving Information Security Awareness and Behavior: Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…FBM is useful in persuasive design (Fogg, 2009). FBM has been used in the cybersecurity domain as well (Jordan et al , 2014; Bawazir et al , 2016; Liljestrand et al , 2019; Parkin et al , 2019; Shah and Agarwal, 2020a, 2020b). FBM posits that three elements, namely, motivation, ability and prompt, should be present simultaneously for behaviour to occur.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…FBM is useful in persuasive design (Fogg, 2009). FBM has been used in the cybersecurity domain as well (Jordan et al , 2014; Bawazir et al , 2016; Liljestrand et al , 2019; Parkin et al , 2019; Shah and Agarwal, 2020a, 2020b). FBM posits that three elements, namely, motivation, ability and prompt, should be present simultaneously for behaviour to occur.…”
Section: Theoretical Frameworkmentioning
confidence: 99%
“…In consequence, not having this multidisciplinary knowledge makes the fight of companies against risks, vulnerabilities, and threats more difficult. Also, it should not be forgotten that, with the growing popularity of the Internet and its services, there is an increase in information security threats, such as social engineering, malware, and hacking, of which some users may not be aware [10]. Additionally, while many different security methods, such as intrusion detection systems and antivirus software, are used to protect IT systems from different attacks, the information security threat landscape continues to rapidly evolve and attackers are putting more effort into developing sophisticated and advanced malware and hacking methods [11].…”
Section: Introductionmentioning
confidence: 99%
“…It has been applied in many fields, including marketing, health, environmental, education and other areas and has been very successful in changing people's attitudes and behaviours (Bawazir, Mahmud, Abdul Molok, & Ibrahim, 2016;Preece, 2010). Accordingly, based on the principles of persuasive technology, a system designed to promote end-user's positive awareness of information security to help them create the recommended informed security actions and enhance safe working practices can be a subjective norm to establish long-term sustainability of end-users' ISA security best practices (Bawazir et al, 2016).…”
Section: Introductionmentioning
confidence: 99%