Semantic Filter
show all semantic filters
Found 85 articles
  • Decide wisely: Interactive videos as appealing educational element to attract students to information security

    2023 | International Conference on Business Informatics | Citations: 0

    Authors: Brehmer, Martin

    Abstract: Educational videos play an important role in university education. However, the ... Expand

    Semantic filters: IT security training

    Topics: IT security training data security anonymity cybersecurity awareness user experience

    Methods: parametric test Student's t-test survey design science descriptive statistic

  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: IT security training

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • A Taxonomy of SETA Methods and Linkage to Delivery Preferences

    PDF

    2023 | ACM SIGMIS Database | Citations: 0

    Authors: Kävrestad, Joakim; Nohlberg, Marcus; Furnell, Steven

    Abstract: Cybersecurity threats targeting users are common in today's information systems. ... Expand

    Semantic filters: IT security training

    Topics: IT workforce IT security online learning system database system usage intention

    Methods: survey literature sample simulation structured literature research literature study

    Theories: technology acceptance model

  • Do SETA Interventions Change Security Behavior? – A Literature Review

    2023 | HICSS | Citations: 0

    Authors: Nwachukwu, Uchechukwu; Vidgren, Jiri; Niemimaa, Marko; Järveläinen, Jonna

    Abstract: Information security education, training, and awareness (SETA) are approaches to ... Expand

    Semantic filters: IT security training

    Topics: data protection self efficacy web application security policy user behavior

    Methods: literature study experiment literature sample design science structured literature research

    Theories: protection motivation theory

  • Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model

    2023 | HICSS | Citations: 0

    Authors: Schütz, Florian; Rampold, Florian; Masuch, Kristin; Köpfer, Patricia; Mann, Dominik; Warwas, Julia; Trang, Simon

    Abstract: Security incidents are increasing in a wide range of organizational types and si ... Expand

    Semantic filters: IT security training

    Topics: data security IT security IT security training phishing IT security defense

    Methods: literature study survey design process

  • Security is Local: The Influence of the Immediate Workgroup on Information Security

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Wang, Dawei; Durcikova, Alexandra; Dennis, Alan

    Abstract: Information security is a multilevel phenomenon with employee security decision ... Expand

    Semantic filters: IT security training

    Topics: data security IT security threat IT security password self efficacy

    Methods: survey theory development descriptive statistic data transformation factor analysis

    Theories: big five model social learning theory leader–member exchange theory

  • Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection

    2023 | Management Information Systems Quarterly | Citations: 0

    Authors: Wright, Ryan; Johnson, Steven; Kitchens, Brent

    Abstract: Despite widespread awareness of risks, significant investments in cybersecurity ... Expand

    Semantic filters: IT security training

    Topics: phishing electronic mail system support IT security email phishing

    Methods: theory development literature study simulation logistic regression survey

  • Toward an Effective SETA Program: An Action Research Approach

    2023 | HICSS | Citations: 0

    Authors: Zafar, Humayun; Williams, Jason; Gupta, Saurabh

    Abstract: This study uses action research methods at a large US healthcare facility to cre ... Expand

    Semantic filters: IT security training

    Topics: phishing password cloud computing data security security policy

    Methods: action research experimental group qualitative interview experimental design chi squared test

    Theories: social cognitive theory

  • Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations

    2023 | HICSS | Citations: 0

    Authors: Steiner, Stuart; Plachkinova, Miloslava; Conte De Leon, Daniel; Shepherd, Morgan

    Abstract: Cybersecurity touches all aspects of organizational management, with organizati ... Expand

    Semantic filters: IT security training

    Topics: IT security decision making IT manager information technology capability IT security training

    Methods: natural language processing personal interview case study qualitative content analysis

  • The Role of Heuristics in Information Security Decision Making

    PDF

    2022 | HICSS | Citations: 1

    Authors: Fard Bahreini, Amir; Cenfetelli, Ron; Cavusoglu, Hasan

    Abstract: Inadvertent human errors (e.g., clicking on phishing emails or falling for a spo ... Expand

    Semantic filters: IT security training

    Topics: decision making data security password privacy website design

    Methods: qualitative interview card sorting literature study triangulation post-hoc analysis

    Theories: theory of bounded rationality behavioral economics