Information security awareness and behavior: a theory-based literature review

B Lebek, J Uffen, M Neumann, B Hohler… - Management …, 2014 - emerald.com
Purpose–This paper aims to provide an overview of theories used in the field of employees'
information systems (IS) security behavior over the past decade. Research gaps and …

An integrated view of human, organizational, and technological challenges of IT security management

R Werlinger, K Hawkey, K Beznosov - Information Management & …, 2009 - emerald.com
Purpose–The purpose of this study is to determine the main challenges that IT security
practitioners face in their organizations, including the interplay among human …

Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q)

K Parsons, A McCormac, M Butavicius, M Pattinson… - Computers & …, 2014 - Elsevier
It is increasingly acknowledged that many threats to an organisation's computer systems can
be attributed to the behaviour of computer users. To quantify these human-based …

The psychology of security for the home computer user

AE Howe, I Ray, M Roberts… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
The home computer user is often said to be the weakest link in computer security. They do
not always follow security advice, and they take actions, as in phishing, that compromise …

From culture to disobedience: Recognising the varying user acceptance of IT security

S Furnell, KL Thomson - Computer fraud & security, 2009 - Elsevier
It is often observed that addressing security can be as much about people as it is
technology. One of the key aspects here is establishing the correct mindset, and ensuring …

Human factors and information security: individual, culture and security environment

K Parsons, A McCormac, M Butavicius, L Ferguson - 2010 - apps.dtic.mil
The application of information security technologies do not always result in improved
security. Human factors play a significant role in computer security factors such as individual …

A study of information security awareness in Australian government organisations

K Parsons, A McCormac, M Pattinson… - … & Computer Security, 2014 - emerald.com
Purpose–The purpose of this paper is to investigate the human-based information security
(InfoSec) vulnerabilities in three Australian government organisations. Design/methodology …

An exploratory investigation of message-person congruence in information security awareness campaigns

M Kajzer, J D'Arcy, CR Crowell, A Striegel… - Computers & …, 2014 - Elsevier
In this study, we sought to answer the question of whether certain information security
awareness message themes are more or less effective for different types of individuals …

Trustworthy and effective communication of cybersecurity risks: A review

JRC Nurse, S Creese, M Goldsmith… - 2011 1st Workshop on …, 2011 - ieeexplore.ieee.org
Slowly but surely, academia and industry are fully accepting the importance of the human
element as it pertains to achieving security and trust. Undoubtedly, one of the main …

SETA and security behavior: Mediating role of employee relations, monitoring, and accountability

W Yaokumah, DO Walker, P Kumah - Research Anthology on …, 2022 - igi-global.com
This article contends that information security education, training and awareness programs
can improve employee security behavior. Empirical studies have analyzed the direct effects …