2019
DOI: 10.1007/s41125-019-00052-x
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Methods for Evaluating Security Awareness Initiatives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 41 publications
0
11
0
Order By: Relevance
“…• RQ2: How are the attitudes of users affected by each intervention approach? Attitude refers to the state of mind an individual has about the object of interest Ryan and Deci (2000), and it is directly linked with their awareness level Assenza et al (2019); Murchison (1935).…”
Section: Methodsmentioning
confidence: 99%
“…• RQ2: How are the attitudes of users affected by each intervention approach? Attitude refers to the state of mind an individual has about the object of interest Ryan and Deci (2000), and it is directly linked with their awareness level Assenza et al (2019); Murchison (1935).…”
Section: Methodsmentioning
confidence: 99%
“…Defences within the digital space include detections, prevention and response to threats using software tools built around institutional security policies but no technology-based defence system deal with cyberbullying related threats. The human aspect of the information system usage is believed to be the weakest link in the execution of the security program [4]. Therefore, a well-focused education program on cybersecurity awareness to prevent cyberbullying of various forms is critical for the users [4].…”
Section: International Journal Of Social Science Research and Reviewmentioning
confidence: 99%
“…The human aspect of the information system usage is believed to be the weakest link in the execution of the security program [4]. Therefore, a well-focused education program on cybersecurity awareness to prevent cyberbullying of various forms is critical for the users [4]. The education program may involve protection against data leakages and secure use of emails, social media, and passwords [5], [6].…”
Section: International Journal Of Social Science Research and Reviewmentioning
confidence: 99%
“…Notice that OSINT can also be used to contrast social engineering attacks. Indeed, understanding what kind of data is exposed on the network is extremely relevant to design appropriate awareness campaigns (Assenza et al, 2020 ). Hence, there are several examples of integrating the OSINT methodology into the organization's security system, particularly in the cybersecurity field.…”
Section: Introductionmentioning
confidence: 99%