2019
DOI: 10.1007/s10796-019-09977-z
|View full text |Cite
|
Sign up to set email alerts
|

The Utility of Information Security Training and Education on Cybersecurity Incidents: An empirical evidence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(24 citation statements)
references
References 44 publications
1
13
0
Order By: Relevance
“…As noted in Figure 2 , the topic of cybersecurity in confluence with organisational awareness and training is a necessity. It is also evident that the frequency of such articles becoming published is gradually increasing year over year, even in the short span of six months in 2021 [ 3 , 7 , 17 , 22 , 23 , 24 , 26 , 34 , 38 , 39 , 40 , 41 ]. The total number of articles in this domain is already almost half the number of published articles from last year, and more than 75% of the articles from 2019.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…As noted in Figure 2 , the topic of cybersecurity in confluence with organisational awareness and training is a necessity. It is also evident that the frequency of such articles becoming published is gradually increasing year over year, even in the short span of six months in 2021 [ 3 , 7 , 17 , 22 , 23 , 24 , 26 , 34 , 38 , 39 , 40 , 41 ]. The total number of articles in this domain is already almost half the number of published articles from last year, and more than 75% of the articles from 2019.…”
Section: Resultsmentioning
confidence: 99%
“…In this section, we present a summary analysis of the key aspects being addressed in the literature that relate to the impact of “social engineering” attacks launched against healthcare professionals. The publications are classified into three main categories, namely (i) training and awareness activities on social engineering attacks (e.g., phishing) [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]; (ii) activities related to promoting general awareness on information security against cyber attacks [ 18 , 19 , 20 , 21 , 22 , 23 ]; and (iii) best practice recommendations adopted in promoting cyber hygiene from other industrial sectors [ 24 , 25 , 26 , 27 , 28 , 66 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, many employees fail to comply with their organizations' information security policies (Li et al , 2019). This lack of compliance can lead to more security and data breaches, even as it underscores the ineffectiveness of many CSAT programs (Kweon et al , 2019). Hence, a good CSAT program must be designed in such a way that it not only improves employees' knowledge but also motivates them to develop compliant behaviors.…”
Section: Introductionmentioning
confidence: 99%
“…To identify the assets related to the system, system functions were first had identified [32][33][34][35][36][37][38]. The scope of the risk assessment was the company's booking system, represented by an application that provides reservation and ticketing services to various transport sectors through the company's digital channels (see Table IV).…”
Section: ) Asset Identificationmentioning
confidence: 99%