2015
DOI: 10.1057/ejis.2013.27
|View full text |Cite
|
Sign up to set email alerts
|

Managing the introduction of information security awareness programmes in organisations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
51
0
4

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(56 citation statements)
references
References 41 publications
1
51
0
4
Order By: Relevance
“…Previous results showed positive effects [17,30]. An explanation may refer to other environmental or contextual factors to explain this result [16,24,33]. Besides, perceived severity has a significant positive effect on intention, thereby supporting H2.…”
Section: Discussion Of the Resultssupporting
confidence: 57%
See 1 more Smart Citation
“…Previous results showed positive effects [17,30]. An explanation may refer to other environmental or contextual factors to explain this result [16,24,33]. Besides, perceived severity has a significant positive effect on intention, thereby supporting H2.…”
Section: Discussion Of the Resultssupporting
confidence: 57%
“…The aim of ISA programs is to increase employees' ISA concerning current information security threats and risks by delivering the content of the ISP to banks' employees [5,33]. In practice, ISA programs vary from bank to bank and different methods are used to make their employees more aware [4,5].…”
Section: The Effects Of Isa Programs On Employees' Protection Motivationmentioning
confidence: 99%
“…This indicates that variations in intentions may be further explained by other factors beyond what the three TPB predictors (i.e., attitude, subjective norms and perceived behavioral control) have accounted for. Tsohou, Karyda, Kokolakis, and Kiountouzis [5], Wang, Gupta and Rao [67], and…”
Section: Antecedents Influencing Dysfunctional Behavioral Intentionmentioning
confidence: 99%
“…They have a dual role in information security systems, both as allies and as a source of threats [5]. Studies have suggested that within the information security chain, insiders remain the weakest link in the effort to secure organizational IS assets [2,3,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Common themes of security policy research include evaluations of the design of policies [11,14,36,49], policy implications for security awareness and culture [24,32,35,44,46], and overall security outcomes for the organization [15,23,43,51].…”
Section: Introductionmentioning
confidence: 99%