2019
DOI: 10.1007/978-3-030-25109-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Personalising Security Education: Factors Influencing Individual Awareness and Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 12 publications
1
8
0
Order By: Relevance
“…In their study, they also found that current one-size-fitsall training approaches have no impact on knowledge and behavior. This is consistent with other literature (e.g., [2], [6]) indicating the need for improving the traditional approach to information security training. Anichiti et al [30] provide segmentation based on users' knowledge about cyber security in hotels.…”
Section: B User Segmentation Based On Security-related Characteristicssupporting
confidence: 92%
See 3 more Smart Citations
“…In their study, they also found that current one-size-fitsall training approaches have no impact on knowledge and behavior. This is consistent with other literature (e.g., [2], [6]) indicating the need for improving the traditional approach to information security training. Anichiti et al [30] provide segmentation based on users' knowledge about cyber security in hotels.…”
Section: B User Segmentation Based On Security-related Characteristicssupporting
confidence: 92%
“…Two key approaches for provision of training can be found in the literature, i.e., traditional and personalized training [2], [6]. The traditional (i.e., one-size-fits-all) approach follows the premise that all users should get the same training [2], [6], [7] although its content can be tailored to the needs of a specific organization. The traditional approach may not be suitable for all situations and often fails to deliver the intended benefits [2], [6], [8], [9].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…They can be an experienced hacker who helps testers in fnding vulnerabilities [74], an intermediary between the security and development teams [25,70], or the leader in threat modelling activities [10,63]. They are involved in several security-related activities such as educating other developers [31,33,34,38,73], increasing awareness [19,33,34], and promoting the adoption of technologies [31,32,34].…”
Section: Related Workmentioning
confidence: 99%