Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

Investigating the impact of cybersecurity policy awareness on employees' cybersecurity behavior

L Li, W He, L Xu, I Ash, M Anwar, X Yuan - International Journal of …, 2019 - Elsevier
As internet technology and mobile applications increase in volume and complexity,
malicious cyber-attacks are evolving, and as a result society is facing greater security risks in …

Defining organisational information security culture—Perspectives from academia and industry

A Da Veiga, LV Astakhova, A Botha, M Herselman - Computers & Security, 2020 - Elsevier
The ideal or strong information security culture can aid in minimising the threat of humans to
information protection and thereby aid in reducing data breaches or incidents in …

The human aspects of information security questionnaire (HAIS-Q): two further validation studies

K Parsons, D Calic, M Pattinson, M Butavicius… - Computers & …, 2017 - Elsevier
Abstract Information security awareness (ISA) is integral to protecting an organisation from
cyber threats. The aim of this paper is to further establish the validity of the Human Aspects …

Educating and raising awareness on cyber security social engineering: A literature review

H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …

Do chatbots establish “humanness” in the customer purchase journey? An investigation through explanatory sequential design

YK Dwivedi, J Balakrishnan… - Psychology & …, 2023 - Wiley Online Library
Chatbots incorporate various behavioral and psychological marketing elements to satisfy
customers at various stages of their purchase journey. This research follows the foundations …

[HTML][HTML] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …

S Bauer, EWN Bernroider, K Chudzikowski - computers & security, 2017 - Elsevier
In organizations, users' compliance with information security policies (ISP) is crucial for
minimizing information security (IS) incidents. To improve users' compliance, IS managers …

Don't even think about it! The effects of antineutralization, informational, and normative communication on information security compliance

JB Barlow, M Warkentin, D Ormond… - Journal of the …, 2018 - aisel.aisnet.org
Organizations use security education, training, and awareness (SETA) programs to counter
internal security threats and promote compliance with information security policies. Yet …

Security education, training, and awareness programs: Literature review

S Hu, C Hsu, Z Zhou - Journal of Computer Information Systems, 2022 - Taylor & Francis
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …