2023 | International Conference on Business Informatics | Citations: 0
Authors: Brehmer, Martin
Abstract: Educational videos play an important role in university education. However, the ... Expand
Semantic filters: IT security training
Topics: IT security training data security anonymity cybersecurity awareness user experience
Methods: parametric test Student's t-test survey design science descriptive statistic
2023 | HICSS | Citations: 0
Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina
Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand
Semantic filters: IT security training
Topics: IT security user behavior information technology capability IT security defense password
Methods: qualitative interview personal interview qualitative coding grounded theory case study
2023 | ACM SIGMIS Database | Citations: 0
Authors: Kävrestad, Joakim; Nohlberg, Marcus; Furnell, Steven
Abstract: Cybersecurity threats targeting users are common in today's information systems. ... Expand
Semantic filters: IT security training
Topics: IT workforce IT security online learning system database system usage intention
Methods: survey literature sample simulation structured literature research literature study
Theories: technology acceptance model
2023 | HICSS | Citations: 0
Authors: Nwachukwu, Uchechukwu; Vidgren, Jiri; Niemimaa, Marko; Järveläinen, Jonna
Abstract: Information security education, training, and awareness (SETA) are approaches to ... Expand
Semantic filters: IT security training
Topics: data protection self efficacy web application security policy user behavior
Methods: literature study experiment literature sample design science structured literature research
Theories: protection motivation theory
2023 | HICSS | Citations: 0
Authors: Schütz, Florian; Rampold, Florian; Masuch, Kristin; Köpfer, Patricia; Mann, Dominik; Warwas, Julia; Trang, Simon
Abstract: Security incidents are increasing in a wide range of organizational types and si ... Expand
Semantic filters: IT security training
Topics: data security IT security IT security training phishing IT security defense
Methods: literature study survey design process
2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Wang, Dawei; Durcikova, Alexandra; Dennis, Alan
Abstract: Information security is a multilevel phenomenon with employee security decision ... Expand
Semantic filters: IT security training
Topics: data security IT security threat IT security password self efficacy
Methods: survey theory development descriptive statistic data transformation factor analysis
Theories: big five model social learning theory leader–member exchange theory
2023 | Management Information Systems Quarterly | Citations: 0
Authors: Wright, Ryan; Johnson, Steven; Kitchens, Brent
Abstract: Despite widespread awareness of risks, significant investments in cybersecurity ... Expand
Semantic filters: IT security training
Topics: phishing electronic mail system support IT security email phishing
Methods: theory development literature study simulation logistic regression survey
2023 | HICSS | Citations: 0
Authors: Zafar, Humayun; Williams, Jason; Gupta, Saurabh
Abstract: This study uses action research methods at a large US healthcare facility to cre ... Expand
Semantic filters: IT security training
Topics: phishing password cloud computing data security security policy
Methods: action research experimental group qualitative interview experimental design chi squared test
Theories: social cognitive theory
2023 | HICSS | Citations: 0
Authors: Steiner, Stuart; Plachkinova, Miloslava; Conte De Leon, Daniel; Shepherd, Morgan
Abstract: Cybersecurity touches all aspects of organizational management, with organizati ... Expand
Semantic filters: IT security training
Topics: IT security decision making IT manager information technology capability IT security training
Methods: natural language processing personal interview case study qualitative content analysis
2022 | HICSS | Citations: 1
Authors: Fard Bahreini, Amir; Cenfetelli, Ron; Cavusoglu, Hasan
Abstract: Inadvertent human errors (e.g., clicking on phishing emails or falling for a spo ... Expand
Semantic filters: IT security training
Topics: decision making data security password privacy website design
Methods: qualitative interview card sorting literature study triangulation post-hoc analysis
Theories: theory of bounded rationality behavioral economics