2014
DOI: 10.14445/22312803/ijctt-v10p131
|View full text |Cite
|
Sign up to set email alerts
|

Persuasive Technology Contributions Toward Enhance Information Security Awareness in an Organization

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Due to globalization and strong dependence on internet, organizations are increasingly vulnerable to cyber attacks, e.g. unauthorized access to user account, DOS attacks, virus and phishing (Qudaih et al , 2014). Wada and Odulaja (2012) also stated that with the increased use of ICT, cyber attacks have also increased rapidly.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Due to globalization and strong dependence on internet, organizations are increasingly vulnerable to cyber attacks, e.g. unauthorized access to user account, DOS attacks, virus and phishing (Qudaih et al , 2014). Wada and Odulaja (2012) also stated that with the increased use of ICT, cyber attacks have also increased rapidly.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many people's methods for persuasion are utilized to affect people to behave in a selected manner. Of late, with the aim to raise the impact developed by persuaders on the thoughts of the end users, the persuaders generally utilize technology to form the attitude and behaviour of end users [9].…”
Section: A Persuasionmentioning
confidence: 99%
“…Fogg [4] determined persuasive technology strategies as interactive computer tools that are designed to change attitudes or behaviours or both to make desired outcomes simpler and easier to achieve. Persuasive technology strategy tools have been identified to help, affect, influence, encourage, motivate and educate end users regarding their awareness and behaviour [9]. Fogg asserted that seven strategy tools are generally utilized in persuasive technology tools which include reduction, tunneling, tailoring (customization), suggestion, self-monitoring, surveillance, and conditioning (reinforcing) [27], [28].…”
Section: Persuasive Technology Strategy Tools From An Islamic Viementioning
confidence: 99%
“…According to Qudaih, Bawazir, Usman, and Ibrahim [3], persuasion forms a critical part in the field of human interaction. There are many human ways of persuasion which help in influencing the people to behave in a certain manner.…”
Section: A Meaning Of the Term 'Persuasion'mentioning
confidence: 99%
“…Any breach caused in the information security policy framed by the organization can lead to disastrous consequences. Therefore, the authors have suggested using the computer technology in order to persuade employees of the organization so that they understand the importance of keeping the information safe and secure and also to change their attitude towards the organization [3].…”
Section: A Persuasive Technology For Information Securitymentioning
confidence: 99%