2015
DOI: 10.1016/j.chb.2015.03.054
|View full text |Cite
|
Sign up to set email alerts
|

Design and validation of information security culture framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
74
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 103 publications
(76 citation statements)
references
References 17 publications
2
74
0
Order By: Relevance
“…Users are one of the main elements in the domain of information security. Their commitment and responsibility to safeguard information assets are crucial in ensuring the security of information (Alhogail, 2015). Commitment refers to their effort, promise and support to safeguard organisational information assets.…”
Section: Commitmentmentioning
confidence: 99%
“…Users are one of the main elements in the domain of information security. Their commitment and responsibility to safeguard information assets are crucial in ensuring the security of information (Alhogail, 2015). Commitment refers to their effort, promise and support to safeguard organisational information assets.…”
Section: Commitmentmentioning
confidence: 99%
“…The steps of the methodology proposed for implementation of an ISMS considered this aspect. The ISMS must, also, have an internal integration between its components: strategy, people, organization, technology (AlHogail, 2015).…”
Section: Introductionmentioning
confidence: 99%
“…The management of human error should be priority in organisations. A strong information security culture can contribute to mitigating vulnerabilities stemming from individuals' behaviour [24]. Infrequent back-up of information, using email accounts to send sensitive and confidential information, carrying unencrypted sensitive and confidential information on external hard disk or other movable devices, unlawful use of information, and unauthorised transfer of information are problems that can be solved by replacing proper information security culture [25].…”
Section: Social and Cultural Aspectsmentioning
confidence: 99%