2012 IEEE 14th International Conference on High Performance Computing and Communication &Amp; 2012 IEEE 9th International Confe 2012
DOI: 10.1109/hpcc.2012.187
|View full text |Cite
|
Sign up to set email alerts
|

Improving Organisational Information Security Management: The Impact of Training and Awareness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
20
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(21 citation statements)
references
References 22 publications
1
20
0
Order By: Relevance
“…It reflects the individual's personal beliefs about his or her ability to comply with the ISP (Bulgurcu et al, 2010;Dinev et al, 2009;Herath andRao, 2009a, 2009b;Ifinedo, 2012;Johnston et al, 2010;Johnston and Warkentin, 2010;Pahnila et al, 2007aPahnila et al, , 2007bSiponen et al, 2007;2010;Warkentin et al, 2011). In contrast, controllability represents an individual's perception about available resources and opportunities to actually comply with ISP (Al-Omari et al, 2012a, 2012bHu and Dinev, 2007). Some authors used a combination of the two constructs to conceptualize PBC (Hu and Dinev, 2007;Zhanf et al, 2009).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…It reflects the individual's personal beliefs about his or her ability to comply with the ISP (Bulgurcu et al, 2010;Dinev et al, 2009;Herath andRao, 2009a, 2009b;Ifinedo, 2012;Johnston et al, 2010;Johnston and Warkentin, 2010;Pahnila et al, 2007aPahnila et al, , 2007bSiponen et al, 2007;2010;Warkentin et al, 2011). In contrast, controllability represents an individual's perception about available resources and opportunities to actually comply with ISP (Al-Omari et al, 2012a, 2012bHu and Dinev, 2007). Some authors used a combination of the two constructs to conceptualize PBC (Hu and Dinev, 2007;Zhanf et al, 2009).…”
Section: Resultsmentioning
confidence: 99%
“…Technology acceptance model: In the security awareness context, the TAM determines the employees' intention to comply with ISP, which is influenced by perceived usefulness (PU) and perceived ease-of-use (PEOU) of information security measures (Al-Omari et al, 2012a, 2012b.…”
mentioning
confidence: 99%
“…Other works that explored the theory of planned behaviour [21,22] suggested that training and awareness are the most significant factors that influence human behaviour and attitude towards information security. It was argued that attitude, perceived expectation and subjective norm are the incentive components of behavioural intention.…”
Section: Relevant Workmentioning
confidence: 99%
“…Even though the number of information security awareness training programs are growing progressively, there is inadequate evidence to verify their effectiveness and impact on daily activities in a work environment [21]. Literature [6] [13] has stated that some of the information security awareness training programs are not effective enough.…”
Section: Introductionmentioning
confidence: 99%
“…Literature [21] stated that it is essential to increase the effectiveness of information security awareness training programs by encouraging employees to make effort in transferring the skills learned to their daily job activities. It is important to understand and emphasize the factors that differentiate effective trainings from ineffective trainings.…”
Section: Introductionmentioning
confidence: 99%