2017
DOI: 10.1016/s1353-4858(17)30122-8
|View full text |Cite
|
Sign up to set email alerts
|

Security education and awareness: just let them burn?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
19
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 4 publications
3
19
0
1
Order By: Relevance
“…Pode ser considerada, essencialmente, como uma medida preventiva que tem como objetivo estabelecer os princípios e procedimentos de cibersegurança na mente de todos os colaboradores, alertando-os para os problemas de segurança existentes e as suas possíveis consequências (Kajava & Siponen, 2002, Woerner, 2012. Em suma, pretende-se concentrar a atenção dos colaboradores na cibersegurança e aumentar a sua preocupação e sensibilização com estes temas (Furnell, 2017;Wilson & Hash, 2003).…”
Section: Consciencialização Em Cibersegurançaunclassified
“…Pode ser considerada, essencialmente, como uma medida preventiva que tem como objetivo estabelecer os princípios e procedimentos de cibersegurança na mente de todos os colaboradores, alertando-os para os problemas de segurança existentes e as suas possíveis consequências (Kajava & Siponen, 2002, Woerner, 2012. Em suma, pretende-se concentrar a atenção dos colaboradores na cibersegurança e aumentar a sua preocupação e sensibilização com estes temas (Furnell, 2017;Wilson & Hash, 2003).…”
Section: Consciencialização Em Cibersegurançaunclassified
“…P EOPLE are known to be the weakest link in information security [1], [2]. Lack of sufficient information security can lead to loss of finances and reputation [3].…”
Section: Introductionmentioning
confidence: 99%
“…Two key approaches for provision of training can be found in the literature, i.e., traditional and personalized training [2], [6]. The traditional (i.e., one-size-fits-all) approach follows the premise that all users should get the same training [2], [6], [7] although its content can be tailored to the needs of a specific organization. The traditional approach may not be suitable for all situations and often fails to deliver the intended benefits [2], [6], [8], [9].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The most common cyber threats include malicious software (malware) such as viruses, keyloggers and trojans, and techniques such as phishing and social engineering designed to harm individuals financially or mentally and to steal personal information (Chakraborty, 2019;Erbschloe, 2019;Kara & Aydos, 2019;Prem & Reddy, 2019). Against the above-mentioned risks, individuals should possess adequate knowledge and skills to maintain personal cyber security to safely meet all their needs and operate for various purposes without being harmed in the virtual environment (Furnell & Vasileiou, 2017;Kemper, 2019;Smith & Ali, 2019). In other words, the competence to maintain cyber security has become a sine qua non for anyone with a presence in the virtual environment for various purposes.…”
Section: Introductionmentioning
confidence: 99%