Security education, training, and awareness programs: Literature review

S Hu, C Hsu, Z Zhou - Journal of Computer Information Systems, 2022 - Taylor & Francis
Security education, training, and awareness (SETA) is one of the most common and
prominent strategies for organizational security governance. However, only a small portion …

[HTML][HTML] Software compliance requirements, factors, and policies: A systematic literature review

M Mubarkoot, J Altmann, M Rasti-Barzoki, B Egger… - Computers & …, 2023 - Elsevier
Background Recent statistics reveal that 56% of software attacks are caused by insider
negligence and 26% are caused by malicious insiders. They also show that 67% of …

Seeing the forest and the trees

WA Cram, J D'arcy, JG Proudfoot - MIS quarterly, 2019 - JSTOR
A rich stream of research has identified numerous antecedents to employee compliance
(and noncompliance) with information security policies. However, the number of competing …

Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model

NF Khan, N Ikram, H Murtaza, M Javed - Computers & Security, 2023 - Elsevier
Context Cybersecurity behavioral literature has a significant number of studies on training
and awareness. However, there is lack of theoretical underpinnings in develo** …

Organizational science and cybersecurity: abundant opportunities for research at the interface

RS Dalal, DJ Howard, RJ Bennett, C Posey… - Journal of business and …, 2022 - Springer
Cybersecurity is an ever-present problem for organizations, but organizational science has
barely begun to enter the arena of cybersecurity research. As a result, the “human factor” in …

Fostering information security compliance as organizational citizenship behavior

A Vedadi, M Warkentin, DW Straub… - Information & …, 2024 - Elsevier
Abstract Information security is heightened when employees develop a strong sense of
information stewardship for information assets, a form of organizational citizenship behavior …

[PDF][PDF] Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research.

WA Cram, J D'Arcy, A Benlian - MIS Quarterly, 2024 - researchgate.net
Many of the theories used in behavioral cybersecurity research have been applied with a
nomothetic approach, which is characterized by cross-sectional data (eg, one-time surveys) …

What motivates users to adopt cybersecurity practices? A survey experiment assessing protection motivation theory

CE Dodge, N Fisk, GW Burruss… - Criminology & Public …, 2023 - Wiley Online Library
Abstract Research Summary A 2× 2× 3 fully crossed factorial experiment is used to examine
the linkages between key dimensions of protection motivation theory (PMT; perceived …

“Get a red-hot poker and open up my eyes, it's so boring” 1: Employee perceptions of cybersecurity training

A Reeves, D Calic, P Delfabbro - Computers & security, 2021 - Elsevier
Organisations and security professionals design Security Education, Training, and
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …

Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse

AJ Burns, TL Roberts, C Posey… - Information Systems …, 2023 - pubsonline.informs.org
Despite widespread agreement among practitioners and academicians that organizational
insiders are a significant threat to organizational information systems security, insider …