DOI: 10.53846/goediss-5137
|View full text |Cite
|
Sign up to set email alerts
|

Studies on Employees’ Information Security Awareness

Felix Häußinger

Abstract: B. General Background on Information Security .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 133 publications
(483 reference statements)
0
5
0
Order By: Relevance
“…ISA is an informal socially constructed concept (Tsohou et. al, 2008) and its varied use in different contexts creates hindrance in its understanding as well as in proposing a universal definition for it (Häußinger, 2015). This diversity at time frustrates security professionals, such as researchers, practitioners and managers (Amankwa, Loock, & Kritzinger, 2014).…”
Section: Background Information Security Awareness (Isa)mentioning
confidence: 99%
See 1 more Smart Citation
“…ISA is an informal socially constructed concept (Tsohou et. al, 2008) and its varied use in different contexts creates hindrance in its understanding as well as in proposing a universal definition for it (Häußinger, 2015). This diversity at time frustrates security professionals, such as researchers, practitioners and managers (Amankwa, Loock, & Kritzinger, 2014).…”
Section: Background Information Security Awareness (Isa)mentioning
confidence: 99%
“…Some security professional considers ISA as a way to direct individuals' attentions towards the IS and to make them concerned (Al-Hamdani, 2006) while Siponen, (2001) believes that compliance of the individual is also part of it. A review of literature reveals that ISA can have different aspects, cognitive, behavioral and process (Häußinger, 2015). This diversity of understanding extends to ISA assessment as well (Rahim et al, 2015).…”
Section: Background Information Security Awareness (Isa)mentioning
confidence: 99%
“…As a consequence, when end-users believe the ISPs are valuable, they are more likely to influence and increase the motivation and actions to perform ISPs that enhance information security systems and job performance. PU was found to have a significant effect on security awareness and compliance with ISPs (Haeussinger, 2015a(Haeussinger, , 2015bLebek et al, 2014a). The present study, therefore, hypothesized the following:…”
Section: Perceived Usefulnessmentioning
confidence: 78%
“…From the view of information security, the PEOU is connected to the degree to which an end-user feels that the use of relevant roles and responsibilities of ISPs is relatively simple and effort-free (Al-Omari et al, 2012b). End-users should improve their PEOU of the related information security measures and make their effectiveness as clear as possible (Haeussinger, 2015b). Concerning security awareness, the TAM indicates the intention of end-users to comply with ISP, which is influenced by PEOU in information security measures (Lebek et al, 2014a).…”
Section: Perceived Ease Of Usementioning
confidence: 99%
“…Meanwhile, Alharbi et al (2021) discovered that professional employees with more cyber security knowledge tend to practise poor cyber hygiene, especially concerning losing an organization's sensitive data. Haeussinger & Kranz (2017) further argued that knowledge may be a double-edged sword as information technology knowledge enables employees to manipulate an organization's cyber security policy or even engage in fraudulent cyber security behaviour. However, contradictory findings exist regarding the relationship between knowledge and cyber hygiene practices.…”
Section: Literature Reviewmentioning
confidence: 99%