2014
DOI: 10.1108/mrr-04-2013-0085
|View full text |Cite
|
Sign up to set email alerts
|

Information security awareness and behavior: a theory-based literature review

Abstract: For AuthorsIf you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information. About Emerald www.emeraldinsight.comEmerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio of more than 290 journals and over 2,350 books and b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

5
152
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 184 publications
(158 citation statements)
references
References 98 publications
5
152
0
1
Order By: Relevance
“…Organizations need information systems and have to implement strong security measures to mitigate security threats [54]. Employees in an organization can become a potential threat intentionally or not [69].…”
Section: Planned Behavior Theory (Pbt)mentioning
confidence: 99%
See 1 more Smart Citation
“…Organizations need information systems and have to implement strong security measures to mitigate security threats [54]. Employees in an organization can become a potential threat intentionally or not [69].…”
Section: Planned Behavior Theory (Pbt)mentioning
confidence: 99%
“…The literature proposes the employment of security policies, education, training, awareness, and programs [6]. Studying additional factors that impact the employees' behavior can be useful [54]. Again communications within the organization regarding security policies need to be adequate and understood [69].…”
Section: Planned Behavior Theory (Pbt)mentioning
confidence: 99%
“…Technological solutions alone cannot guarantee data protection against various threats. Even though there are advanced technologies, human factor still remains as the major risk to the integrity of information systems security [17] [24]. At this point, numerous security experts believe that implementation of security policy and enforcement are the most sensible approach to protect information systems security [15] and the key to an effective security control program [15] [22].…”
Section: Introductionmentioning
confidence: 99%
“…Of course, to claim that cybersecurity is predominantly about technology does not do the issue justice, not least because there is ample research both recognizing and focusing upon the human aspect of the security equation (Furnell & Clarke, 2012;Lebek, Uffen, Neumann, Hohler, & Breiter, 2014). Despite this human aspect, this article will proceed from the claim: cybersecurity is about technology.…”
Section: Introductionmentioning
confidence: 99%