Proceedings of the 3rd Annual Conference on Information Security Curriculum Development 2006
DOI: 10.1145/1231047.1231075
|View full text |Cite
|
Sign up to set email alerts
|

The effect of computer self-efficacy on security training effectiveness

Abstract: The purpose of this paper is to determine the effectiveness different levels of instruction have on security tool usage for individuals at different levels of computer self-efficacy. This is accomplished by utilizing a quasi-experimental method to demonstrate the effect that computer self-efficacy has on people's usage of security tools as well as the affect that different levels of instruction have on computer self-efficacy and usage of security tools. Initial results support that a person's level of computer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…2.5.2 Security education, training and awareness (SETA) programs. Organisations employ SETA programs and their exercises to counter security threats and promote employee compliance behaviour towards ISPs (Crossler and B elanger, 2006;D'Arcy et al, 2009). Both ISPs and SETA exercises are IS risk management measures that are delivered at low-cost but can generate high ROI (Whitman, 2003).…”
Section: It Security Policiesmentioning
confidence: 99%
“…2.5.2 Security education, training and awareness (SETA) programs. Organisations employ SETA programs and their exercises to counter security threats and promote employee compliance behaviour towards ISPs (Crossler and B elanger, 2006;D'Arcy et al, 2009). Both ISPs and SETA exercises are IS risk management measures that are delivered at low-cost but can generate high ROI (Whitman, 2003).…”
Section: It Security Policiesmentioning
confidence: 99%
“…In praxis and in the literature there exists a great variety of different designs, methods, and nomenclatures of institutional security training activities. Some of the various practices are e.g., the explanation of ISPs(Straub and Welke 1998), periodic newsletters, emails and presentations concerning ISS relevant issues(Spurling 1995, Herath andRao 2009a), ISS workshops and seminars(Thomson and von Solms 1998), providing posters, flyers, and lectures(Crossler and Bélanger 2006), supporting online-- and computer--based learning(Chen et al 2006), or periodic security refresher courses(Hansche 2001a, von Solms and.SETA programs aim to improve organizational information security by increasing employees' knowledge and awareness of potential security risks, policies, and responsibilities. Furthermore, they aim at providing employees with the skills necessary to comply with organizational ISS procedures(Straub and Welke 1998, Whitman et al 2001, Lee and Lee 2002, D'Arcy et al 2009).…”
mentioning
confidence: 99%