2015
DOI: 10.1016/j.cose.2015.05.012
|View full text |Cite
|
Sign up to set email alerts
|

Information security conscious care behaviour formation in organizations

Abstract: Conscious care behaviourAwareness Risk Organization policy a b s t r a c t Today, the Internet can be considered to be a basic commodity, similar to electricity, without which many businesses simply cannot operate. However, information security for both private and business aspects is important. Experts believe that technology cannot solely guarantee a secure environment for information. Users' behaviour should be considered as an important factor in this domain. The Internet is a huge network with great poten… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

16
183
0
6

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 257 publications
(231 citation statements)
references
References 47 publications
16
183
0
6
Order By: Relevance
“…Conscious care behaviour is an effective approach to counter creative attacks to reduce the risk of information security breaches (Safa et al, 2015). When a user is faced with a suspicious email that asks him/her to change his/her username or password, user awareness and knowledge about phishing sends the first alarm to his/her mind.…”
Section: Conscious Care Behaviourmentioning
confidence: 99%
See 1 more Smart Citation
“…Conscious care behaviour is an effective approach to counter creative attacks to reduce the risk of information security breaches (Safa et al, 2015). When a user is faced with a suspicious email that asks him/her to change his/her username or password, user awareness and knowledge about phishing sends the first alarm to his/her mind.…”
Section: Conscious Care Behaviourmentioning
confidence: 99%
“…Suitable information security training is necessary to improve users' awareness. Formal presentations, games, Internet pages, email, meetings, posters, pens and screen savers are key methods to improve individuals' knowledge and awareness (Safa, Sookhak et al, 2015). Hackers use creative, ingenious and novel methods to achieve their targets.…”
Section: The Lack Of Awarenessmentioning
confidence: 99%
“…[18,23] utilised the TPB to show how the disposition to comply with OISPs is formed in the organisations. Safa, Sookhak [3] also used the TPB to explain the formation of information security conscious care behaviour in organisations. In another study, Cox [24] used the TPB to investigate the disregard of information security policies by users, even though they know the policies.…”
Section: Theory Of Planned Behaviourmentioning
confidence: 99%
“…In the modern environment, information security is the most important and controversial subject among experts [1]. Applying different strategies, such as acting based on information security organisational procedures and policies [2], information security conscious care behaviour [3], sharing information security knowledge [4,5] and information security collaboration in organisations [6], have been acknowledged to be useful in decreasing the vulnerability of information security incidents in companies. A novel conceptual model is presented in this study that depicts how collaboration develops and reduces the risk of information security incidents in organisations.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, hackers use novel and creative methods to access information assets. Different kinds of phishing, social engineering, and misleading software are examples of methods typically used to achieve their target [2]. Users, intentionally or unintentionally, are a source of risk for information assets.…”
Section: Introductionmentioning
confidence: 99%