Develo** metrics to assess the effectiveness of cybersecurity awareness program

S Chaudhary, V Gkioulos, S Katsikas - Journal of Cybersecurity, 2022 - academic.oup.com
Cybersecurity awareness (CSA) is not just about knowing, but also transforming things
learned into practice. It is a continuous process that needs to be adjusted in subsequent …

A systematic review of approaches to assessing cybersecurity awareness

NHA Rahim, S Hamid, ML Mat Kiah, S Shamshirband… - Kybernetes, 2015 - emerald.com
Purpose–The purpose of this paper is to survey, explore and inform researchers about the
previous methodologies applied, target audience and coverage of previous assessment of …

Develo** a cyber security culture: Current practices and future needs

B Uchendu, JRC Nurse, M Bada, S Furnell - Computers & Security, 2021 - Elsevier
While the creation of a strong security culture has been researched and discussed for
decades, it continues to elude many businesses. Part of the challenge faced is distilling …

A cyber-security culture framework for assessing organization readiness

A Georgiadou, S Mouzakitis, K Bounas… - Journal of Computer …, 2022 - Taylor & Francis
This paper presents a cyber-security culture framework for assessing and evaluating the
current security readiness of an organization's workforce. Having conducted a thorough …

[HTML][HTML] Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in …

S Bauer, EWN Bernroider, K Chudzikowski - computers & security, 2017 - Elsevier
In organizations, users' compliance with information security policies (ISP) is crucial for
minimizing information security (IS) incidents. To improve users' compliance, IS managers …

Building a cybersecurity culture

I Corradini - Building a Cybersecurity Culture in Organizations: How …, 2020 - Springer
Cybersecurity Culture (CSC) is unique for an organization and not replicable for others,
being based on its specific characteristics, in terms of technologies, processes, and people's …

Applying basic gamification techniques to IT compliance training: Evidence from the lab and field

RJ Baxter, DK Holderness Jr… - Journal of information …, 2016 - publications.aaahq.org
Companies depend on internal control to protect the integrity of information systems. IT
security and data privacy training are critical controls for safeguarding company information …

[HTML][HTML] Respite for SMEs: A systematic review of socio-technical cybersecurity metrics

M Van Haastrecht, B Yigit Ozkan, M Brinkhuis… - Applied sciences, 2021 - mdpi.com
Featured Application The results of this work will be incorporated in an application for SMEs
in Europe, which aims to improve cybersecurity awareness and resilience, as part of the EU …

Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives

A Alyami, D Sammon, K Neville… - Information & Computer …, 2024 - emerald.com
Purpose Cyber security has never been more important than it is today in an ever more
connected and pervasive digital world. However, frequently reported shortages of suitably …

The critical success factors for Security Education, Training and Awareness (SETA) program effectiveness: a lifecycle model

A Alyami, D Sammon, K Neville… - Information Technology & …, 2023 - emerald.com
Purpose This study explores the critical success factors (CSFs) for Security Education,
Training and Awareness (SETA) program effectiveness. The questionable effectiveness of …