2015
DOI: 10.1016/j.procs.2015.12.151
|View full text |Cite
|
Sign up to set email alerts
|

Information Security Awareness at the Knowledge-Based Institution: Its Antecedents and Measures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
41
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4
2

Relationship

3
7

Authors

Journals

citations
Cited by 89 publications
(43 citation statements)
references
References 28 publications
1
41
0
1
Order By: Relevance
“…Meanwhile, acceptance can be described as an important factor in developing success or failure of any IT adoption, which it has been conceptualized as a response variable from psychological aspect in decision making process [23]. Other study also indicated that the religious indicator and consistent training program to create awareness among student also can be used to manipulate behavior towards certain adoption of innovation [37].…”
Section: B Technology Acceptance and Diffusion Of Innovationmentioning
confidence: 99%
“…Meanwhile, acceptance can be described as an important factor in developing success or failure of any IT adoption, which it has been conceptualized as a response variable from psychological aspect in decision making process [23]. Other study also indicated that the religious indicator and consistent training program to create awareness among student also can be used to manipulate behavior towards certain adoption of innovation [37].…”
Section: B Technology Acceptance and Diffusion Of Innovationmentioning
confidence: 99%
“…The system is embedded in the HIS that accept the data sent by relevant staff periodically should be through proper check mechanism and strict authorization structure. Thus, the security procedure need to be matched with the readiness of system involving the user, activities, structure and technology in the observed environment [17]. Furthermore, there are number of regulation with specific issues have been enacted by legislative over decades that might have different principles, attributes and consideration lead to different interpretation in the court, which complicate the citizen even certain legal experts to understand the regulation [18].…”
Section: Fixing Data Problemmentioning
confidence: 99%
“…Therefore, this study engaged a bag-of-words model to retrieve an interesting topics, patterns, and terms from social media Twitter in relation with ITE implementation in Indonesia. The intention of havingsecurity policy was not to persuade users but to convince them, by letting the users reflect, on their ownterms, on why information security is important and on how to react in certain circumstances [18].…”
Section: Literature Reviewmentioning
confidence: 99%